exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eEye-MSN-CHAT-OCX.txt

eEye-MSN-CHAT-OCX.txt
Posted May 13, 2002
Authored by eEye Digital Security, Drew Copley | Site eEye.com

A buffer overflow vulnerability has been found by eEye in the parameter handling of the MSN Messenger OCX and can allow remote code execution on affected systems.

tags | remote, overflow, code execution
SHA-256 | 76df0e68a796ea743a0cc568c84f1055d8df681f7945e0a436d49f5ed4e21b47

eEye-MSN-CHAT-OCX.txt

Change Mirror Download
MSN Messenger OCX Buffer Overflow 

Release Date:
5/8/2002

Severity:
High (Remote code execution)

Systems Affected:
Microsoft MSN Chat Control
Microsoft MSN Messenger 4.5 and 4.6, which includes the MSN Chat control
Microsoft Exchange Instant Messenger 4.5 and 4.6, which includes the MSN
Chat control

Description:
A vulnerability has been discovered in the parameter handling of the MSN
Messenger OCX. By exploiting this vulnerability, an attacker can supply and
execute code on any machine on which MSN Messenger with the activex is
installed.

The vulnerability exists because of how MSN Messenger handles data passed to
it which can lead to a buffer overflow scenario. The buffer overflow can be
exploited via email, web, or through any other method where Internet
Explorer is used to display HTML that an attacker supplies, including
software that uses the web browser ActiveX control.

All users of Internet Explorer are potentially affected because this is a
Microsoft signed OCX. Users that have not installed Microsoft Messenger or
that have not upgraded Microsoft Messenger can only be affected if they
accept the pop-up "Install Now" signed by Microsoft. All Internet Explorer
users should install the update.

Example:

<object classid="clsid:9088E688-063A-4806-A3DB-6522712FC061" width="455"
height="523">
<param name="_cx" value="12039">
<param name="_cy" value="13838">
<param name="BackColor" value="50331647">
<param name="ForeColor" value="43594547">
<param name="RedirectURL" value="">
<param name="ResDLL" value="AAAAAAA[27,257 bytes is where the EIP starts]">
</object>

Technical Description:

MSNChat ocx is an ActiveX object installed with Microsoft Messenger. Proper
bounds checking is not in place in the ResDLL parameter. By supplying a very
large buffer, we can overwrite a significant portion of the stack, including
saved return addresses and exception handlers.

Even if users do not have Messenger installed, the ActiveX can be called
from the codebase tag which would prompt the user to install the ActiveX
with Microsoft's credentials because the OCX is signed by Microsoft.

Vulnerability identifier: CAN-2002-0155

Vendor Status:
Microsoft has released a security bulletin and patch. For more information
visit:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/
bulletin/MS02-022.asp

Credit:
Discovery: Drew Copley

Greetings: Mom, Dad, and all of the little people that helped me and
believed in me - oh - and a big YO HO to the homeboyz in the h00d.

Copyright (c) 1998-2002 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express consent of
eEye. If you wish to reprint the whole or any part of this alert in any
other medium excluding electronic medium, please e-mail alert@eEye.com for
permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.

Feedback
Please send suggestions, updates, and comments to:

eEye Digital Security
http://www.eEye.com
info@eEye.com
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close