exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

TheGreenBow VPN Client Local Stack Overflow

TheGreenBow VPN Client Local Stack Overflow
Posted Jan 22, 2010
Authored by Brett Gervasoni | Site senseofsecurity.com.au

TheGreenBow VPN Client is vulnerable to a local stack based buffer overflow which can lead to the compromise of a vulnerable system. The vulnerability is caused due to a boundary error when processing certain sections of tgb (policy) files. Passing an overly long string to "OpenScriptAfterUp" will trigger the overflow. Successful exploitation results in the execution of arbitrary code.

tags | advisory, overflow, arbitrary, local
SHA-256 | 1ffec12a678c5b206a9f84012a31ba855c8fdf3a743bd8d5c1d652387ca0644c

TheGreenBow VPN Client Local Stack Overflow

Change Mirror Download
TheGreenBow VPN Client Local Stack Overflow - Security Advisory - SOS-10-001


Release Date. 21-Jan-2010
Last Update. 21-Jan-2010
Vendor Notification Date. 11-Dec-2009
Product. TheGreenBow VPN Client
Platform. Microsoft Windows
Affected versions. 4.65.003, 4.51.001 verified and
possibly others.
Severity Rating. High
Impact. System access
Attack Vector. Local
Solution Status. Vendor patch
CVE reference. Not yet assigned

Details.
TheGreenBow is an IPsec VPN client that sets up a secure channel
for data transport.

TheGreenBow VPN Client is vulnerable to a local stack based buffer
overflow which can lead to the compromise of a vulnerable system.

The vulnerability is caused due to a boundary error when processing
certain sections of tgb (policy) files. Passing an overly long
string to "OpenScriptAfterUp" will trigger the overflow.

Successful exploitation results in the execution of arbitrary code.

Solution.
A patch is available from the vendor (unverified) and will be
included in the next release.

Discovered by.
Brett Gervasoni from SOS Labs.

About us.
Sense of Security is a leading provider of information security and risk
management solutions. Our team has expert skills in assessment and
assurance, strategy and architecture, and deployment through to ongoing
management. We are Australia's premier application penetration testing firm
and trusted IT security advisor to many of the countries largest
organisations.

Sense of Security Pty Ltd

Level 3, 66 King St
Sydney NSW 2000
AUSTRALIA


T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au/consulting/penetration-testing
E: info@senseofsecurity.com.au
Twitter: ITsecurityAU



The latest version of this advisory can be found at:

http://www.senseofsecurity.com.au/advisories/SOS-10-001.pdf



Other Sense of Security advisories can be found at:

http://www.senseofsecurity.com.au/research/it-security-advisories.php


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close