exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

wildtangent.txt

wildtangent.txt
Posted May 28, 2004
Authored by Peter Winter-Smith | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR27052004 - It is possible to cause a number of buffer overruns within the WildTangent WTHoster and Web Driver modules via any method that takes a filename as a parameter. Version 4.0 tested and others are possibly affected.

tags | advisory, web, overflow
SHA-256 | 1fd4a6d0da967ff355c42ac21d6118964e275521cf330235468cd3d7fe398cc5

wildtangent.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: WildTangent Web Driver Long FileName Stack Overflow
Systems Affected: WildTangent Web Driver 4.0 (earlier versions not tested)
Severity: High
Vendor URL: http://www.wildtangent.com
Author: Peter Winter-Smith [ peter@ngssoftware.com ]
Date Vendor Notified: 31th March 2004
Date of Public Advisory: 27th May 2004
Advisory number: #NISR27052004
Advisory URL: http://www.ngssoftware.com/advisories/wildtangent.txt


Description
***********

WildTangent provide high quality interactive media technology to the
Internet in the form of their WebDriver. This is used by some of the
largest companies and corporations world-wide to provide advanced media
content to over 80 million users of their Internet plug-in.


Details
*******

It is possible to cause a number of buffer overruns within the WildTangent
package, namely within the WTHoster and WebDriver modules, via any method
which takes a filename as an parameter. During the process of constructing
an absolute path for this file, a concatenation of a predefined directory
path and the filename supplied as a parameter occurs through an unchecked
call to strcat(). This can easily be made to overflow the buffer and can
allow arbitrary remote code execution on the target system.

A working exploit has been created and tested against a vulnerable system,
and as such it is highly recommended that users of the WildTangent plug-in
install the updated version immediately.


Fix Information
***************

WebDriver 4.1 has been released to protect against the vulnerability. This
can be obtained from the WildTangent website at the address below:

http://www.wildtangent.com/default.asp?pageID=webdriver_download


A check for this vulnerability has been added to Typhon III, NGSSoftware's
advanced vulnerability assessment scanner. For more information please
visit the NGSSoftware website at http://www.ngssoftware.com/


About NGSSoftware
*****************

NGSSoftware design, research and develop intelligent, advanced application
security assessment scanners. Based in the United Kingdom, NGSSoftware
have offices in the South of London and the East Coast of Scotland.
NGSSoftware's sister company NGSConsulting, offers best of breed security
consulting services, specialising in application, host and network
security assessments.

http://www.ngssoftware.com/

Telephone +44 208 401 0070
Fax +44 208 401 0076

enquiries@ngssoftware.com
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close