---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Friendly Technologies fwDialerTechTool.dll Multiple Vulnerabilities SECUNIA ADVISORY ID: SA31644 VERIFY ADVISORY: http://secunia.com/advisories/31644/ CRITICAL: Highly critical IMPACT: Exposure of sensitive information, System access WHERE: >From remote SOFTWARE: Friendly Technologies fwRemoteConfig (fwDialerTechTool.dll) 3.x http://secunia.com/product/19699/ DESCRIPTION: Some vulnerabilities have been discovered in Friendly Technologies fwDialerTechTool.dll ActiveX control, which can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) A boundary error exists within the "CreateURLShortcut()" method when handling an overly long parameter. This can be exploited to cause a buffer overflow when a user e.g. visits a malicious website. Successful exploitation allows execution of arbitrary code. 2) The ActiveX control contains the insecure method "RunApp()", which allows launching of arbitrary applications with parameters when a user e.g. visits a malicious website. 3) The ActiveX control contains the insecure method "RegistryValue()", which allows reading and writing arbitrary registry keys when a user e.g. visits a malicious website. The vulnerabilities are confirmed in version 3.3.3.1 of the ActiveX control as included with FriendlyPPPoE version 3.0.0.57. Other versions may also be affected. SOLUTION: Set the kill-bit for the affected ActiveX control. PROVIDED AND/OR DISCOVERED BY: spdr ORIGINAL ADVISORY: http://milw0rm.com/exploits/6323 http://milw0rm.com/exploits/6324 http://milw0rm.com/exploits/6334 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------