ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: iDefense Security Advisory 01.09.07: Multiple Microsoft ProductsVML 'recolorinfo' Element Integer Overflow Vulnerability



> -----Original Message-----
> From: 
> idlabs-advisories-bounces+vladimir.kazennov=billing.ru@idefens
> e.com 
> [mailto:idlabs-advisories-bounces+vladimir.kazennov=billing.ru
> @idefense.com] On Behalf Of iDefense Labs Security Advisories
> Sent: Tuesday, January 09, 2007 10:14 PM
> To: iDefense Labs Security Advisories
> Subject: iDefense Security Advisory 01.09.07: Multiple 
> Microsoft ProductsVML 'recolorinfo' Element Integer Overflow 
> Vulnerability
> 
> Microsoft Windows VML Element Integer Overflow Vulnerability
> 
> iDefense Security Advisory 01.09.07
> http://labs.idefense.com/intelligence/vulnerabilities/
> Jan 09, 2007
> 
> I. BACKGROUND
> 
> VML is a component of the Extensible Markup Language (XML) 
> that specifies
> vector images (e.g., rectangles and ovals). This functionality is
> implemented by the library "vgx.dll" in Microsoft Windows. More
> information is available at the following web site.
> 
> http://www.w3.org/TR/NOTE-VML
> 
> II. DESCRIPTION
> 
> Remote exploitation of an integer overflow vulnerability in the Vector
> Markup Language (VML) support in multiple Microsoft products allows
> attackers to execute arbitrary code within the context of the 
> user running
> the vulnerable application.
> 
> This vulnerability exists due to insufficient input validation within
> vgx.dll. Two integer properties are multiplied together and 
> no overflow
> check is performed. This could allow an attacker to force a memory
> allocation of a smaller amount of memory than is required. 
> When copying
> user supplied data into the newly allocated memory, it is possible to
> overwrite a function pointer stored on the heap, which leads to the
> execution of arbitrary code.
> 
> III. ANALYSIS
> 
> Successful exploitation of this vulnerability would allow an 
> attacker to
> execute arbitrary code in the context of the user running the 
> vulnerable
> application.
> 
> Exploitation would require an attacker to persuade a user to visit a
> malicious website using Internet Explorer, read a specially crafted e-
> mail message with Microsoft Outlook, or open a specially 
> crafted document
> using an affected Microsoft Office application.
> 
> It is important to note that this vulnerability could be 
> exploited without
> user interaction via an e-mail message when rendered within 
> Outlook. For
> example, if a user with the reading pane turned on had 
> Outlook open to an
> empty in-box when an attack e-mail arrived, exploitation could occur
> automatically.
> 
> IV. DETECTION
> 
> iDefense testing shows that Internet Explorer 6.0 bundled 
> with Windows XP
> SP2 with all available security patches is vulnerable. Other 
> versions of
> Internet Explorer, including those with all security updates 
> applied, are
> also vulnerable. Older versions of Internet Explorer may also 
> vulnerable.
> 
> Microsoft Outlook with all available updates has been found to be
> vulnerable. iDefense has identified Microsoft Office 
> products, including
> Outlook, going back as far as Office 2000 may also vulnerable.
> 
> V. WORKAROUND
> 
> iDefense Labs has developed the following workaround:
> 
> The following registry entry defines the library that implements the
> vulnerable functionality:
> 
> [HKEY_CLASSES_ROOT\CLSID\{10072CEC-8CC1-11D1-986E-00A0C955B42E
> }\InprocServer32]
> 
> 
> Changing 'InprocServer32' in this registry entry to 'InprocServer32
> -disabled' causes the control that handles InprocServer32 not to load.
> Completely removing the key also provides the same protection.
> 
> iDefense strongly recommends that users back up the registry before
> changing or removing this key.
> 
> It should also be noted that since the vulnerable component is not an
> ActiveX control, setting the kill bit does not disable the 
> vulnerable DLL.
> As a result, setting the kill bit provides no protection against
> exploitation.
> 
> For previous vulnerabilities in this component, Microsoft suggested
> unregistering 'vgx.dll' on Windows XP SP1 and SP2 and Windows 2003 and
> 2003 SP1 systems. Using the "RegSvr32" program to unregister 
> the dll in
> question with the following command also unregisters Vgx.dll:
> 
> regsvr32 -u "%ProgramFiles%\Common Files\Microsoft Shared\VGX\vgx.dll"
> 
> Alternatively, system administrators can deny "Full Access" 
> to the file
> "%ProgramFiles%\Common Files\Microsoft Shared\VGX\vgx.dll".
> 
> The preceding workarounds will provide complete protection, but may
> prevent proper rendering of documents that rely on VML, such 
> as Microsoft
> Word, Excel, and PowerPoint documents when saved in HTML 
> format and viewed
> in IE or another application that uses the affected component. These
> documents can still be opened in the respective applications and will
> render correctly.
> 
> To mitigate the e-mail attack vector, Microsoft recommends that system
> administrators configure Outlook to view all e-mail messages in
> plain-text, including those from digitally signed "trusted" sources.
> Applying this workaround will prevent the rendering or rich 
> content such
> as images and special formatting.
> 
> VI. VENDOR RESPONSE
> 
> Microsoft has addressed this vulnerability with Microsoft 
> Security Bulletin
> MS07-004. A link to this bulletin can be found below.
> 
> http://www.microsoft.com/technet/security/bulletin/ms07-004.mspx
> 
> VII. CVE INFORMATION
> 
> The Common Vulnerabilities and Exposures (CVE) project has 
> assigned the
> name CVE-2007-0024 to this issue. This is a candidate for inclusion in
> the CVE list (http://cve.mitre.org), which standardizes names for
> security problems.
> 
> VIII. DISCLOSURE TIMELINE
> 
> 10/03/2006  Initial vendor notification
> 10/03/2006  Initial vendor response
> 01/09/2007  Coordinated public disclosure
> 
> IX. CREDIT
> 
> This vulnerability was reported to iDefense by Jospeh Moti.
> 
> Get paid for vulnerability research
> http://labs.idefense.com/methodology/vulnerability/vcp.php
> 
> Free tools, research and upcoming events
> http://labs.idefense.com/
> 
> X. LEGAL NOTICES
> 
> Copyright (c) 2006 iDefense, Inc.
> 
> Permission is granted for the redistribution of this alert 
> electronically.
> It may not be edited in any way without the express written consent of
> iDefense. If you wish to reprint the whole or any part of 
> this alert in
> any other medium other than electronically, please e-mail
> customerservice@xxxxxxxxxxxx for permission.
> 
> Disclaimer: The information in the advisory is believed to be 
> accurate at
> the time of publishing based on currently available 
> information. Use of
> the information constitutes acceptance for use in an AS IS condition.
> There are no warranties with regard to this information. Neither the
> author nor the publisher accepts any liability for any 
> direct, indirect,
> or consequential loss or damage arising from use of, or 
> reliance on, this
> information.
> 
> _______________________________________________
> To unsubscribe, go here:
> http://www.idefense.com/mailman/listinfo/idlabs-advisories
> 



 




Copyright © Lexa Software, 1996-2009.