exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AD20060428.txt

AD20060428.txt
Posted Apr 29, 2006
Site secway.org

There is a vulnerability exists in WinISO and UltraISO, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in version WinISO 5.3,UltraISO V8.0.0.1392, PowerISO v2.9,Magic ISO 5.0 Build 0166

tags | advisory
SHA-256 | 71af3606163dc754a646b1ae9fe7da5983c7be7d2835bd08dc5f40059c5be068

AD20060428.txt

Change Mirror Download
WinISO/UltraISO/MagicISO/PowerISO Directory Traversal Vulnerability


By Sowhat of Nevis Labs
Date: 2006.04.28

http://www.nevisnetworks.com
http://secway.org/advisory/AD20060428.txt


CVE: N/A

Vendor

WinISO Computing Inc.
EZB Systems, Inc.
MagicISO Inc.
PowerISO Computing, Inc.



Affected Software

WinISO 5.3
UltraISO V8.0.0.1392
Magic ISO 5.0 Build 0166
PowerISO v2.9


Rating: Moderately critical ( 4 * Less Critical :)


Overview:

WinISO/UltraISO/PowerISO/MagicISO are the 4 most popular software to edit
BIN/ISO or almost all images file(s) directly! It can process almost all
CD-ROM image file(s) including ISO and BINs.


There is a vulnerability exists in WinISO and UltraISO, which
potentially can be exploited by malicious people to compromise a
user's system.



Description:

The vulnerability is caused due to an input validation error when
extracting an ISO archive. This makes it possible to have files
extracted to arbitrary locations outside the specified directory
using the "../" directory traversal sequence.

The vulnerability has been confirmed in version WinISO 5.3,UltraISO V8.0.0.1392,
PowerISO v2.9,Magic ISO 5.0 Build 0166

Other versions may also be affected.



POC:

http://secway.org/exploit/PoC.iso.bin

Rename the PoC.iso.bin to Poc.iso,
Extracting the PoC.iso from C driver will write a "POC" file in your
startup folder.


FIX:

Please check the vendor's website for update.

PowerISO:
"We will fixed this bug in the next released version. In the version,
we will check file name before extract. If such file is detected,
the path name will be removed from the file name, and the program
will allow user to choose whether this file can be extracted"

"Following is the registration code for you as our gift. We think this
may let you to use all features of PowerISO.

User Name : Sowhat
Registration Code : ........"

When will Microsoft give a Windows XP license for the researchers who
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
reported a critical MS bugz for gift? :)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

UltraISO:
"Thanks for your message and the sample ISO image.

We will check it and try to fix any bugs related to this issue soon."

UltraISO fixed this vulnerability in 1 hour, but they didnt release a new
version, because
"In general, we do not change version number for minor changes. This bug
fix will be included in next file update soon."


MagicISO:
"Oops. Yes, we confirm this problem. Thank you for your report and sorry for
our mistake. We will fix this problem in next build asap."

WinISO:

Cannot be reached because of their Mail SYSTEM problems,I have tried GMAIL
and Hotmail over 10 times,

"Delivery to the following recipient failed permanently:

support@winiso.com"

"Delivery to the following recipient failed permanently:

info@winiso.com"


Vendor Response:

2006.04.18 4 Vendors notified via support@xxxxx.com
2006.04.18 3 of 4 Vendors responded
2006.04.28 Advisory released




--
Sowhat
http://secway.org
"Life is like a bug, Do you know how to exploit it ?"

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close