Secunia Security Advisory - Elazar Broad has reported a vulnerability in Autodesk I-drop Indicator, which can be exploited by malicious people to potentially compromise a user's system.
aae995e03bab56401f3f7b931c1f35ed737bc5d6c76bda70798c8709509967ea
----------------------------------------------------------------------
Secunia is pleased to announce the release of the annual Secunia
report for 2008.
Highlights from the 2008 report:
* Vulnerability Research
* Software Inspection Results
* Secunia Research Highlights
* Secunia Advisory Statistics
Request the full 2008 Report here:
http://secunia.com/advisories/try_vi/request_2008_report/
Stay Secure,
Secunia
----------------------------------------------------------------------
TITLE:
Autodesk I-drop Indicator ActiveX Control Memory Corruption
SECUNIA ADVISORY ID:
SA34563
VERIFY ADVISORY:
http://secunia.com/advisories/34563/
DESCRIPTION:
Elazar Broad has reported a vulnerability in Autodesk I-drop
Indicator, which can be exploited by malicious people to potentially
compromise a user's system.
The vulnerability is caused due to a use-after-free error in the
idrop.idrop.2 ActiveX control (IDrop.ocx) when handling the "Src",
"Background", and "PackageXml" properties. This can be exploited to
trigger a memory corruption by tricking the user into visiting a
malicious webpage.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in IDrop.ocx version 17.1.51.160. Other
versions may also be affected.
SOLUTION:
Set the kill-bit for the affected ActiveX control.
NOTE: Reportedly, the vendor has ceased to provide support for the
application.
PROVIDED AND/OR DISCOVERED BY:
Elazar Broad
ORIGINAL ADVISORY:
http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0020.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------