ID

VAR-200901-0399


CVE

CVE-2008-4827


TITLE

AddTab Multiple heap overflow vulnerabilities in methods

Trust: 0.8

sources: JVNDB: JVNDB-2009-001617

DESCRIPTION

Multiple heap-based buffer overflows in the AddTab method in the (1) Tab and (2) CTab ActiveX controls in c1sizer.ocx and the (3) TabOne ActiveX control in sizerone.ocx in ComponentOne SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by adding many tabs, or adding tabs with long tab captions. The SizerOne ActiveX control used in products by multiple vendors is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in denial-of-service conditions. ====================================================================== 2) Severity Rating: Highly critical Impact: System compromise Where: Remote ====================================================================== 3) Vendor's Description of Software "SAP GUI is SAP's universal client for accessing SAP functionality in SAP applications such as - SAP ERP, SAP Business Suite (SAP CRM, SAP SCM and SAP PLM), SAP Business Intelligence and so on. SAP GUI functions like a browser. It gets information from the SAP server like what, where, when and how, to display contents in its window.". Users can also set the kill-bit manually by following the procedure explained in SAP note 1092631. ====================================================================== Secunia Research 07/01/2009 - ComponentOne SizerOne ActiveX Control Buffer Overflow - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Vendor's Description of Software.....................................3 Description of Vulnerability.........................................4 Solution.............................................................5 Time Table...........................................................6 Credits..............................................................7 References...........................................................8 About Secunia........................................................9 Verification........................................................10 ====================================================================== 1) Affected Software * ComponentOne SizerOne 8.0.20081.140 NOTE: Other versions may also be affected. ====================================================================== 2) Severity Rating: Highly critical Impact: System compromise Where: Remote ====================================================================== 3) Vendor's Description of Software "ComponentOne SizerOne 8.0 is a four-in-one tool that includes two resizing controls to easily handle both simple and complex sizing. The tabbing control enables you to quickly create notebook-style and Microsoft Outlook-style tabs. And with the parsing control, you can automatically slice and dice strings." Product Link: http://www.componentone.com/SuperProducts/SizerOne/ ====================================================================== 4) Description of Vulnerability Secunia Research has discovered a vulnerability in ComponentOne SizerOne, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by a boundary error in the included Tab ActiveX control (c1sizer.ocx) when copying tab captions. This can be exploited to cause a heap-based buffer overflow by e.g. adding tabs with overly long captions via the "AddTab()" method. Successful exploitation may allow execution of arbitrary code. ====================================================================== 5) Solution Update to version 8.0.20081.142 of the ActiveX control. ====================================================================== 6) Time Table 13/11/2008 - Vendor notified. 19/11/2008 - Vendor response. 25/11/2008 - Vendor informs that vulnerability has been fixed and offers to provide test version. 26/11/2008 - Copy of fixed test version requested. 01/12/2008 - Test version provided by the vendor. 02/12/2008 - Vendor informed that patch fixes vulnerability nicely. 02/12/2008 - Vendor informs that fix will be available within a week. 05/01/2008 - Status update requested. 05/01/2008 - Vendor informs that fix has been made available. 07/01/2009 - Public disclosure. ====================================================================== 7) Credits Discovered by Carsten Eiram, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-4827 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-52/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . Other versions may also be affected. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-53/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.43

sources: NVD: CVE-2008-4827 // JVNDB: JVNDB-2009-001617 // BID: 33148 // PACKETSTORM: 73654 // PACKETSTORM: 73653 // PACKETSTORM: 73652 // PACKETSTORM: 73673 // PACKETSTORM: 73675 // PACKETSTORM: 73676

AFFECTED PRODUCTS

vendor:sapmodel:guiscope:eqversion:7.10

Trust: 2.1

vendor:componentonemodel:sizeronescope:eqversion:8.0.20081.140

Trust: 2.1

vendor:servantixmodel:tsc2 help deskscope:eqversion:4.18

Trust: 1.6

vendor:servantixmodel:tsc2 help deskscope:eqversion:4.1.8

Trust: 1.1

vendor:sapmodel:tabonescope:eqversion:7.0.0.16

Trust: 1.0

vendor:sapmodel:guiscope:eqversion:6.40

Trust: 1.0

vendor:sapmodel:guiscope:eqversion:6.40 patch 29

Trust: 0.8

vendor:sapmodel:gui patchscope:eqversion:6.4029

Trust: 0.3

vendor:componentonemodel:studio for activexscope:eqversion:20080

Trust: 0.3

vendor:componentonemodel:studio enterprisescope:eqversion:20080

Trust: 0.3

vendor:servantixmodel:tsc2 help deskscope:neversion:4.3.1

Trust: 0.3

vendor:sapmodel:gui plscope:neversion:7.10

Trust: 0.3

vendor:componentonemodel:sizeronescope:neversion:8.0.20081.142

Trust: 0.3

sources: BID: 33148 // JVNDB: JVNDB-2009-001617 // CNNVD: CNNVD-200901-072 // NVD: CVE-2008-4827

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-4827
value: HIGH

Trust: 1.0

NVD: CVE-2008-4827
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200901-072
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2008-4827
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2009-001617 // CNNVD: CNNVD-200901-072 // NVD: CVE-2008-4827

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2009-001617 // NVD: CVE-2008-4827

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200901-072

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200901-072

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001617

PATCH

title:Top Pageurl:http://www.componentsource.co.jp/

Trust: 0.8

title:Top Pageurl:http://www.sap.com/

Trust: 0.8

title:Top Pageurl:http://www.servantix.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-001617

EXTERNAL IDS

db:NVDid:CVE-2008-4827

Trust: 3.0

db:BIDid:33148

Trust: 1.9

db:SECUNIAid:32672

Trust: 1.7

db:SECUNIAid:32609

Trust: 1.7

db:SECUNIAid:32648

Trust: 1.7

db:VUPENid:ADV-2009-0037

Trust: 1.6

db:VUPENid:ADV-2009-0036

Trust: 1.6

db:SECTRACKid:1021529

Trust: 1.6

db:SREASONid:4879

Trust: 1.6

db:JVNDBid:JVNDB-2009-001617

Trust: 0.8

db:XFid:2

Trust: 0.6

db:XFid:47770

Trust: 0.6

db:XFid:47771

Trust: 0.6

db:XFid:47769

Trust: 0.6

db:BUGTRAQid:20090107 SECUNIA RESEARCH: TSC2 HELP DESK CTAB ACTIVEX CONTROL BUFFER OVERFLOW

Trust: 0.6

db:CNNVDid:CNNVD-200901-072

Trust: 0.6

db:PACKETSTORMid:73654

Trust: 0.1

db:PACKETSTORMid:73653

Trust: 0.1

db:PACKETSTORMid:73652

Trust: 0.1

db:PACKETSTORMid:73673

Trust: 0.1

db:PACKETSTORMid:73675

Trust: 0.1

db:PACKETSTORMid:73676

Trust: 0.1

sources: BID: 33148 // JVNDB: JVNDB-2009-001617 // PACKETSTORM: 73654 // PACKETSTORM: 73653 // PACKETSTORM: 73652 // PACKETSTORM: 73673 // PACKETSTORM: 73675 // PACKETSTORM: 73676 // CNNVD: CNNVD-200901-072 // NVD: CVE-2008-4827

REFERENCES

url:http://secunia.com/secunia_research/2008-52/

Trust: 2.1

url:http://secunia.com/secunia_research/2008-53/

Trust: 2.1

url:http://secunia.com/secunia_research/2008-54/

Trust: 2.1

url:http://www.securityfocus.com/bid/33148

Trust: 1.6

url:http://securitytracker.com/id?1021529

Trust: 1.6

url:http://securityreason.com/securityalert/4879

Trust: 1.6

url:http://secunia.com/advisories/32672

Trust: 1.6

url:http://secunia.com/advisories/32648

Trust: 1.6

url:http://secunia.com/advisories/32609

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/47770

Trust: 1.0

url:http://www.vupen.com/english/advisories/2009/0036

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/47771

Trust: 1.0

url:http://www.securityfocus.com/archive/1/499830/100/0/threaded

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/47769

Trust: 1.0

url:http://www.vupen.com/english/advisories/2009/0037

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4827

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4827

Trust: 0.8

url:http://secunia.com/advisories/business_solutions/

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/47771

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/47770

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/47769

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/499830/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2009/0037

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2009/0036

Trust: 0.6

url:https://www.sdn.sap.com/irj/sdn/sap-gui

Trust: 0.4

url:http://www.componentone.com/superproducts/sizerone/

Trust: 0.4

url:http://www.tsc2-helpdesk.com/

Trust: 0.4

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:/archive/1/508728

Trust: 0.3

url:/archive/1/499830

Trust: 0.3

url:msg://bugtraq/200901071252.n07cqvck024883@ca.secunia.com

Trust: 0.3

url:http://secunia.com/secunia_research/

Trust: 0.3

url:http://secunia.com/corporate/jobs/

Trust: 0.3

url:http://secunia.com/advisories/mailing_lists/

Trust: 0.3

url:http://secunia.com/advisories/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2008-4827

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://secunia.com/advisories/product/16959/

Trust: 0.1

url:http://secunia.com/advisories/32672/

Trust: 0.1

url:http://secunia.com/advisories/product/3337/

Trust: 0.1

url:http://secunia.com/advisories/product/19930/

Trust: 0.1

url:http://secunia.com/advisories/32609/

Trust: 0.1

url:http://secunia.com/advisories/product/20923/

Trust: 0.1

url:http://secunia.com/advisories/product/20924/

Trust: 0.1

url:http://secunia.com/advisories/product/20925/

Trust: 0.1

url:http://secunia.com/advisories/product/9673/

Trust: 0.1

url:http://secunia.com/advisories/32648/

Trust: 0.1

sources: BID: 33148 // JVNDB: JVNDB-2009-001617 // PACKETSTORM: 73654 // PACKETSTORM: 73653 // PACKETSTORM: 73652 // PACKETSTORM: 73673 // PACKETSTORM: 73675 // PACKETSTORM: 73676 // CNNVD: CNNVD-200901-072 // NVD: CVE-2008-4827

CREDITS

Carsten Eiram

Trust: 1.2

sources: BID: 33148 // PACKETSTORM: 73654 // PACKETSTORM: 73653 // PACKETSTORM: 73652 // CNNVD: CNNVD-200901-072

SOURCES

db:BIDid:33148
db:JVNDBid:JVNDB-2009-001617
db:PACKETSTORMid:73654
db:PACKETSTORMid:73653
db:PACKETSTORMid:73652
db:PACKETSTORMid:73673
db:PACKETSTORMid:73675
db:PACKETSTORMid:73676
db:CNNVDid:CNNVD-200901-072
db:NVDid:CVE-2008-4827

LAST UPDATE DATE

2024-11-23T19:39:36.417000+00:00


SOURCES UPDATE DATE

db:BIDid:33148date:2010-01-05T21:02:00
db:JVNDBid:JVNDB-2009-001617date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200901-072date:2009-01-29T00:00:00
db:NVDid:CVE-2008-4827date:2024-11-21T00:52:40.183

SOURCES RELEASE DATE

db:BIDid:33148date:2009-01-07T00:00:00
db:JVNDBid:JVNDB-2009-001617date:2009-07-08T00:00:00
db:PACKETSTORMid:73654date:2009-01-07T20:02:45
db:PACKETSTORMid:73653date:2009-01-07T20:01:12
db:PACKETSTORMid:73652date:2009-01-07T19:59:14
db:PACKETSTORMid:73673date:2009-01-07T15:31:14
db:PACKETSTORMid:73675date:2009-01-07T15:31:20
db:PACKETSTORMid:73676date:2009-01-07T15:31:23
db:CNNVDid:CNNVD-200901-072date:2009-01-08T00:00:00
db:NVDid:CVE-2008-4827date:2009-01-08T19:30:11.063