lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 3 Oct 2012 22:08:28 +0200
From: "Stefan Kanthak" <stefan.kanthak@...go.de>
To: <bugtraq@...urityfocus.com>
Cc: <full-disclosure@...ts.grok.org.uk>
Subject: Vulnerable MSVC++ 2008 runtime libraries distributed with and installed by Ogg DirectShow filters

Hi @ll,

the Ogg DirectShow filters available from <http://www.xiph.org/dshow/>
are distributed with and install vulnerable MSVC++ 2008 runtime libraries
MSVC?90.DLL.

See <http://support.microsoft.com/kb/2467174>
and <http://support.microsoft.com/kb/2538243>
resp. <http://www.microsoft.com/technet/security/bulletin/MS11-025.mspx>


To make things worse, the vulnerable libraries are NOT installed as
side-by-side components below %SystemRoot%\WinSxS\, but as private
components in the applications directory, where they are not detected
and not updated by tools like Windows Update Agent or Secunia PSI.

Cf. <http://support.microsoft.com/kb/835322>


Additionally, the installer places the 64-bit components into the
wrong path "%ProgramFiles(x86)%\Xiph.org\OpenCodecs\x64\".


Workaround:
~~~~~~~~~~~

Delete all MSVC?.DLL installed with the Ogg DirectShow filters
in "%ProgramFiles(x86)%\Xiph.org\OpenCodecs\" and
"%ProgramFiles(x86)%\Xiph.org\OpenCodecs\x64\".


Timeline:
~~~~~~~~~

2010-05-23    informed maintainer about errors and problems in
              version 0.82.16930

2010-05-25    maintainer replied "will have a look"

2010-07-21    maintainer released version 0.84.17338

2010-07-21    informed maintainer about problems still not fixed

2011-01-12    maintainer released "current" version 0.85.17777 

2012-03-08    asked maintainer for a fix for the vulnerable MSVCRT

2012-03-09    maintainer replied "planning update before easter"

2012-10-03    report published


Stefan Kanthak

Powered by blists - more mailing lists