what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SVRT-05-08.txt

SVRT-05-08.txt
Posted Nov 24, 2008
Authored by SVRT | Site security.bkis.vn

SVRT-Bkis has detected a serious buffer overflow vulnerability in ffdshow which affects all available internet browsers. Taking advantage of the flaw, hackers can perform remote attack, inject viruses, steal sensitive information and even take control of the victim's system. Versions below rev2347 20081123 are affected.

tags | advisory, remote, overflow
SHA-256 | d5b01d681ab02ae46e8fa752529dd5a7d9d3b36adee4ff615ffda3aa5d2227f5

SVRT-05-08.txt

Change Mirror Download
1. General Information

ffdshow is a DirectShow filter and VFW codec for many audio and video
formats, such as DivX, Xvid and H.264. It is the most popular audio and
video decoder on Windows. Besides a stand-alone setup package, ffdshow is
often included in almost all codec pack software such as K-lite Codec Pack,
XP Codec Pack, Vista Codec Package, Codec Pack All in one,.

In Oct 2008, SVRT-Bkis has detected a serious buffer overflow vulnerability
in ffdshow which affects all available internet browsers. Taking advantage
of the flaw, hackers can perform remote attack, inject viruses, steal
sensitive information and even take control of the victim's system.

Since ffdshow is an open source software (can be found at
http://sourceforge.net/projects/ffdshow-tryout), we have contacted the
developing team and they have patched the vulnerability in the latest
version of ffdshow.

Details : http://security.bkis.vn/?p=277
SVRT Advisory : SVRT-05-08
Initial vendor notification : 13-11-2008
Release Date : 24-11-2008
Update Date : 24-11-2008
Discovered by : SVRT-Bkis
Security Rating : Critical
Impact Remote : Code Execution
Affected Software : ffdshow (< rev2347 20081123)

2. Technique Description

The flaw occurs when ffdshow works with a media stream (e.g.
http://[website]/test.avi). On parsing an overly long link, ffdshow would
encounter a buffer overflow error as the memory is not allocated and
controlled well.

ffdshow is in fact a codec component for decoding multimedia formats so it
must be used via some media player; the default program is Windows Media
Player (wmp). Due to this reason, all internet browsers that support wmp
plug-in are influenced by this vulnerability, such as Internet Explorer,
Firefox, Opera, Chrome...

In order to exploit, hackers trick users into visiting a website containing
malicious code. If successful, malicious code would be executed without any
users' further interaction. Hackers can then take complete control of the
system.

3. Solution

As for the seriousness of the vulnerability, it has been patched in the
latest version of ffdshow by the developing team of the software. Bkis
Internetwork Security Center highly recommends that users should update
ffdshow to the latest version here:
http://sourceforge.net/project/showfiles.php?group_id=173941&package_id=199416&release_id=439904

At the moment, there are a lot of software packages packing ffdshow that
haven't been updated. On account of this, users should also update the
ffdshow latest versions:
- K-Lite Codec Pack (lastest version).
- XP Codec Pack (lastest version).
- Vista Codec Package (lastest version).
- Codec Pack All in one (lastest version).
- Storm Codec Pack (lastest version).
- And many other software Codec packages using ffdshow.

In addition, software producers that make use of ffdshow in their products
should also update these products with the latest version of ffdshow.

4. Credits
Thanks Nguyen Anh Tai for working with SVRT-Bkis.

----------------------------------------------------------------
Bach Khoa Internetwork Security Center (BKIS)
Hanoi University of Technology (Vietnam)

Email : svrt@bkav.com.vn
Website : www.bkav.com.vn
WebBlog : security.bkis.vn
Our PGP : http://security.bkis.vn/policy/pgp/SVRT-Bkis.gpg
----------------------------------------------------------------



Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close