---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: MW6 Technologies ActiveX Controls Insecure Methods SECUNIA ADVISORY ID: SA32425 VERIFY ADVISORY: http://secunia.com/advisories/32425/ CRITICAL: Less critical IMPACT: Manipulation of data WHERE: >From remote SOFTWARE: MW6 Technologies 1D Barcode ActiveX Control 3.x http://secunia.com/advisories/product/20296/ MW6 Technologies Aztec ActiveX Control 3.x http://secunia.com/advisories/product/20297/ MW6 Technologies DataMatrix ActiveX Control 3.x http://secunia.com/advisories/product/20295/ MW6 Technologies PDF417 ActiveX Control 3.x http://secunia.com/advisories/product/20294/ DESCRIPTION: DeltahackingTEAM has discovered some vulnerabilities in various MW6 Technologies ActiveX controls, which can be exploited by malicious people to overwrite arbitrary files. The vulnerabilities are caused due to the following ActiveX controls including the insecure "SaveAsBMP()" and "SaveAsWMF()" methods: * MW6PDF417Lib.PDF417 (MW6PDF417.dll) * DATAMATRIXLib.MW6DataMatrix (DataMatrix.dll) * BARCODELib.MW6Barcode (Barcode.dll) * AZTECLib.MW6Aztec (Aztec.dll) These can be exploited to overwrite and corrupt arbitrary files on the system, in the context of the currently logged-on user. The vulnerabilities are confirmed in the following versions: * MW6PDF417Lib.PDF417 3.0.0.1 * DATAMATRIXLib.MW6DataMatrix 3.0.0.1 * BARCODELib.MW6Barcode 3.0.0.1 * AZTECLib.MW6Aztec 3.0.0.1 Other versions may also be affected. SOLUTION: Set the kill-bit for the affected ActiveX controls. PROVIDED AND/OR DISCOVERED BY: DeltahackingTEAM ORIGINAL ADVISORY: http://milw0rm.com/exploits/6870 http://milw0rm.com/exploits/6871 http://milw0rm.com/exploits/6872 http://milw0rm.com/exploits/6873 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------