---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Baofeng Storm Multiple Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA26749 VERIFY ADVISORY: http://secunia.com/advisories/26749/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Baofeng Storm 2.x http://secunia.com/product/15666/ DESCRIPTION: ZhenHan.Liu has discovered some vulnerabilities in Baofeng Storm, which can be exploited by malicious people to compromise a user's system. 1) A boundary error in sparser.dll can be exploited to cause a stack-based buffer overflow via e.g. an overly long (greater than 260 bytes) string passed as argument to the "rawParse()" and "advancedOpen()" methods and "URL" property within the MPS.StormPlayer.1 ActiveX control (mps.dll), or via a specially crafted .SMPL file containing an overly long (greater than 260 bytes) "path" string. 2) A boundary error within the MPS.StormPlayer.1 ActiveX control (mps.dll) when handling the "isDVDPath()" method can be exploited to cause a stack-based buffer overflow via an overly long (greater than 260 bytes) string passed as argument to the affected method. 3) Boundary errors within the MPS.StormPlayer.1 ActiveX control (mps.dll) when handling the "backImage()" and "titleImage()" properties can be exploited to cause heap-based buffer overflows by assigning an overly long (greater than 260 bytes) string to the affected properties. Successful exploitation of the vulnerabilities allow execution of arbitrary code. The vulnerabilities are confirmed in version 2.8. Other versions may also be affected. SOLUTION: Set the kill-bit for the affected ActiveX control and do not open untrusted .SMPL files. PROVIDED AND/OR DISCOVERED BY: ZhenHan.Liu ORIGINAL ADVISORY: http://milw0rm.com/exploits/4375 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------