SizerOne ActiveX Control AddTab Method Remote Buffer Overflow

high Nessus Plugin ID 35327

Synopsis

The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.

Description

The SizerOne ActiveX control is installed on the remote system. It is included with ComponentOne Studio Enterprise as well as other applications such as TSC2 Help Desk and SAP GUI.

The installed version of the control is affected by a heap-based buffer overflow vulnerability that can be triggered by adding tabs with very long captions via the control's 'AddTab()' method. If a remote attacker can trick a user on the affected host into viewing a specially crafted HTML document, this issue could be leveraged to execute arbitrary code on the affected host subject to the user's privileges.

Solution

Update to version 8.0.20081.142 of c1sizer.ocx or 7.10 PL of sizerone.ocx.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-52

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-53

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-54

Plugin Details

Severity: High

ID: 35327

File Name: sizerone_addtab_activex_overflow.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 1/9/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-4827

BID: 33148

CWE: 119

SECUNIA: 32609, 32648, 32672