exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

athoc-01full.txt

athoc-01full.txt
Posted Jan 22, 2005
Authored by Mark Litchfield, John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - Multiple vulnerabilities have been discovered in the AtHoc toolbar which can allow remote code execution through Internet Explorer when browsing to a specially crafted webpage.

tags | advisory, remote, vulnerability, code execution
SHA-256 | 47bfb3702c540e74e290ac45de0ac6236c9dac1d8ea51d84b10c5a95b4edf519

athoc-01full.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Multiple Vulnerabilities in the AtHoc Toolbar For MSIE
Systems Affected: AtHoc Toolbar for MSIE
Severity: High
Vendor URL: http://www.athoc.com/site/products/toolbar.asp
Author: Mark Litchfield [ mark@ngssoftware.com ]
John Heasman [ john@ngssoftware.com ]
Date of Public Advisory: 19th January 2004
Advisory number: #NISR19012005c
Advisory URL: http://www.ngssoftware.com/advisories/athoc-01full.txt
Reference: http://www.ngssoftware.com/advisories/athoc-01.txt


Description
***********

Multiple vulnerabilities have been discovered in the AtHoc toolbar which
can allow remote code execution through Internet Explorer when browsing to
a specially crafted webpage. AtHoc sell a development suite which can
allow a vendor to use their technology to create custom toolbars for their
own clients.

Among the most renound of AtHoc's toolbar clients are:

eBay
Accenture
ThomasRegister
ThomasRegional
Juniper Networks
WiredNews
CarFax
Agile PLM

Details
*******

The AtHoc toolbar comes with ActiveX component which exports a number of
methods relating to the specifics of toolbar, such a skin settings,
whether a debug log is to be kept, and numerous other options relating to
customisation.

When attempting to provide an overly long 'skin name' to the SetSkin()
method exported by the control, a stack based buffer overflows,
overwriting a saved return address on the stack and eventually allowing
arbitrary code to be executed.

When the AtHoc toolbar is closed and re-started, a debug log is written
containing various pieces of information relating to the success of
certain operations which have been performed on the AtHoc toolbar during
the users browsing session. One of the operations which is logged, is the
setting of a 'base url', a value which is used by the toolbar when
constructing absolute urls for certain web related functionality. The
SetBaseURL() function is used to set the base url.

If the url provided to the function is not valid, the url is logged by the
toolbar in the debug log, which is stored in the root of the drive on
which the toolbar is installed. The code which writes the invalid base url
to the debug log is vulnerable to a format string attack which can
overwrite arbitrary dwords in memory with arbitrary values. It is possible
to overwrite saved return addresses, function pointers, string pointers
and more to easily gain control over the execution flow of the process,
thus allowing arbitrary code execution.

The vulnerable component is marked safe for scripting by default, thereby
allowing the dangerous functionality to be accessed with little user
interaction.

Fix Information
***************

AtHoc has fixed these vulnerabilities and has advised the various vendors
to update their toolbars to use the latest components. These fixed
toolbars can be downloaded from the vendors respective websites.

About NGSSoftware
*****************

NGSSoftware design, research and develop intelligent, advanced application
security assessment scanners. Based in the United Kingdom, NGSSoftware
have offices in the South of London and the East Coast of Scotland.
NGSSoftware's sister company NGSConsulting, offers best of breed security
consulting services, specialising in application, host and network
security assessments.

http://www.ngssoftware.com/

Telephone +44 208 401 0070
Fax +44 208 401 0076

enquiries@ngssoftware.com



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close