Latest YouTube Video

Tuesday, December 22, 2015

[FD] Aeris Calandar v2.1 - Buffer Overflow Vulnerability

Document Title: =============== Aeris Calandar v2.1 - Buffer Overflow Vulnerability References (Source): ==================== http://ift.tt/1MtMuJr Release Date: ============= 2015-12-01 Vulnerability Laboratory ID (VL-ID): ==================================== 1656 Common Vulnerability Scoring System: ==================================== 6.4 Product & Service Introduction: =============================== Aeris Calendar is a full-featured desktop calendar with current weather conditions, forecasts and severe weather alerts. Aeris Calendar allows you to add reminders, notes, todo`s and special events like birthdays and anniversaries. The extended forecast is displayed directly on the calendar and current conditions are displayed on the calendar, tray icon and desklet. Themes allow you to skin the calendar or you can select any image on your computer to serve as the backdrop for your calendar. (Copy of the Vendor Homepage: http://ift.tt/1V2sa8W ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered a local buffer overflow web vulnerability in the official Aeris Calandar v2.1 software. Vulnerability Disclosure Timeline: ================================== 2015-12-01: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Esumsoft Product: Aeris Calendar - Software 2.1 Exploitation Technique: ======================= Local Severity Level: =============== High Technical Details & Description: ================================ A local unicode buffer overflow has been discovered in the official Aeris Calandar v2.1 software. The local vulnerability allows to overwrite the registers of the software process to compromise the target computer system. The classic buffer overflow vulnerability is located in the software Aeris CaLandar an attacker manipulate the bit EIP register in order to execute the next instruction of their choice. Attacker can for example execute arbitrary codes. The attacker includes a large unicode string to overwrite the EIP register of the process. Finally the attacker is able to compromise the system process of the active program. The security risk of the buffer overflow vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.4. Exploitation of the vulnerability requires a low privilege system user account and no user interaction. Successful exploitation of the local vulnerability results in system compromise by elevation of privileges via overwrite of the registers (EIP,EBP & ECX Co.). Vulnerable Module(s): [+] Weather -> Set Location > Input <> [Search] Proof of Concept (PoC): ======================= The buffer overflow vulnerability can be exploited by local attackers with restricted system user account and without user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Launch Aeris Calandar.exe 2. Click Weather -> Set Location 3. Copy the AAAA...+ string from bof.txt to clipboard 4. Paste it the input Enter your city or zip code and press search AAAA....+ string > click Search 5. Software will crash with a BEX exception 6. Successful reproduce of the local buffer overflow vulnerability!

Source: Gmail -> IFTTT-> Blogger

No comments: