Secunia Security Advisory - shinnai has discovered a vulnerability in Chilkat HTTP ActiveX Component, which can be exploited by malicious people to overwrite arbitrary files.
901f6a2f67ea08beab1ac705424d6539dc3dd76800e38f73753c191f9ef7ae50
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Chilkat HTTP ActiveX Component ActiveX Controls "SaveLastError()"
Insecure Method
SECUNIA ADVISORY ID:
SA29581
VERIFY ADVISORY:
http://secunia.com/advisories/29581/
CRITICAL:
Less critical
IMPACT:
Manipulation of data
WHERE:
>From remote
SOFTWARE:
Chilkat HTTP ActiveX Component 2.x
http://secunia.com/product/18133/
DESCRIPTION:
shinnai has discovered a vulnerability in Chilkat HTTP ActiveX
Component, which can be exploited by malicious people to overwrite
arbitrary files.
The vulnerability is caused due to the ChilkatHttp.ChilkatHttp.1 and
ChilkatHttp.ChilkatHttpRequest.1 ActiveX controls (ChilkatHttp.dll)
including the insecure "SaveLastError()" method. This can be
exploited to overwrite and corrupt arbitrary files in the system in
the context of the currently logged-on user.
The vulnerability is confirmed in ChilkatHttp.dll version 2.4.0.0 and
reported in version 2.3. Other versions may also be affected.
SOLUTION:
Set the kill-bit for the affected ActiveX controls.
PROVIDED AND/OR DISCOVERED BY:
shinnai
ORIGINAL ADVISORY:
http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------