what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

msinsengfull.txt

msinsengfull.txt
Posted Jan 22, 2005
Authored by Peter Winter-Smith | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - All versions of Microsoft Windows, with Microsoft Internet Explorer, come packaged with the Microsoft Active Setup/Install Engine components. These components are marked as safe for scripting and can be invoked by default from any basic web-page. The Install Engine control has been found to be vulnerable to an integer overflow, leading to a heap based buffer overflow which could allow an attacker to run arbitrary code on a vulnerable system through a specially crafted web-page or through a specially crafted HTML email if scripting is enabled.

tags | advisory, web, overflow, arbitrary
systems | windows
SHA-256 | d9a90dc6d979b15bba061d46b49298b04958b6f90ae6a35aadb861dcce281d1e

msinsengfull.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Microsoft Internet Explorer Install Engine Control Buffer Overflow
Systems Affected: Microsoft Internet Explorer 5.x/6.x
Severity: High
Vendor URL: http://www.microsoft.com/
Author: Peter Winter-Smith [ peter@ngssoftware.com ]
Date of Public Advisory: 19th January 2004
Advisory number: #NISR19012005a
Advisory URL: http://www.ngssoftware.com/advisories/msinsengfull.txt
Reference: http://www.ngssoftware.com/advisories/msinsengdll.txt

Description
***********

All versions of Microsoft Windows, with Microsoft Internet Explorer, come
packaged with the Microsoft Active Setup/Install Engine components. These
components are marked as safe for scripting and can be invoked by default
from any basic web-page.

The Install Engine control has been found to be vulnerable to an integer
overflow, leading to a heap based buffer overflow which could allow an
attacker to run arbitrary code on a vulnerable system through a specially
crafted web-page or through a specially crafted HTML email if scripting is
enabled.

Details
*******

When calling the SetCifFile() method provided by the Active Setup Controls
ActiveX component 'asctrls.ocx', if the first parameter (the '.cab' file
name) is a string of a length in excess of about 2kb, an integer overflow
occurs when attempting to calculate the buffer space allowed for copying
the base url.

The vulnerable code path will only be executed if the 'BaseURL' property
has previously been set. The value stored as this property is the first
string which can be made to overflow the heap.

After the base url is copied into the buffer, the string which we have
provided as the cab file name is concatenated onto the end of our buffer
without any length checking, making it the second string which can
overflow the heap.

The vulnerable code is located within the Install Engine Control module
('inseng.dll') which is provided with the Active Setup Controls component,
both of which can be found in the 'System32' folder in the Windows
directory.

The vulnerable code can be seen below:

MOV EBX,DWORD PTR DS:[<&KERNEL32.lstrcpynA>] ; kernel32.lstrcpynA()

...

PUSH DWORD PTR SS:[EBP+C] ; /String = Cab file name
AND BYTE PTR DS:[ESI],0 ; |
CALL DWORD PTR DS:[<&KERNEL32.lstrlenA>] ; \lstrlenA()

MOV ECX,822 ; Max buffer size
SUB ECX,EAX ; Calculate remaining buffer space - integer overflow!

PUSH ECX ; /n = Unchecked value - remaining buffer space!
PUSH DWORD PTR SS:[EBP-8] ; |String2 = BaseURL property value
PUSH ESI ; |String1 = 0x822 bytes heap buffer
CALL EBX ; \lstrcpynA()

MOV EDI,DWORD PTR DS:[<&KERNEL32.lstrcatA>] ; kernel32.lstrcatA()
PUSH inseng.66561C84 ; /StringToAdd = "/"
PUSH ESI ; |ConcatString = Our heap buffer
CALL EDI ; \lstrcatA()

PUSH DWORD PTR SS:[EBP+C] ; /StringToAdd = Our Cab file name
PUSH ESI ; |ConcatString = Our heap buffer
CALL EDI ; \lstrcatA()

Fix Information
***************

Microsoft have released an update for Microsoft Internet Explorer which is
set to address this issue. This can be downloaded from:

http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx

A check for this vulnerability has been added to Typhon III, NGSSoftware's
advanced vulnerability assessment scanner. For more information please
visit the NGSSoftware website at http://www.ngssoftware.com/


About NGSSoftware
*****************

NGSSoftware design, research and develop intelligent, advanced application
security assessment scanners. Based in the United Kingdom, NGSSoftware
have offices in the South of London and the East Coast of Scotland.
NGSSoftware's sister company NGSConsulting, offers best of breed security
consulting services, specialising in application, host and network
security assessments.

http://www.ngssoftware.com/

Telephone +44 208 401 0070
Fax +44 208 401 0076

enquiries@ngssoftware.com


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close