MS Interactive Training .cbo Overflow Feb 13 2007 11:04PM
Brett Moore (brett moore security-assessment com)

= MS Interactive Training .cbo Overflow
= MS Bulletin posted:
= http://www.microsoft.com/technet/security/bulletin/MS07-005.mspx
= Affected Software:
= Microsoft Windows 2000
= Microsoft Windows XP
= Microsoft Windows Server 2003
= Public disclosure on February 14, 2007

== Overview ==

When thinking about buffer overflow vulnerabilities, a file can
be as harmful as a packet. Even though past security issues have taught
us that it is unwise to use a string from a file/packet without first
checking its length, this is what happened here.

MS Interactive Training will open a file with a .cbo extension and read
in the Syllabus details.

Through the creation of a corrupt file, with a long Syllabus string it
possible to gain control of EIP and execute arbitrary code.

== Exploitation ==

Remote exploitation through Internet Explorer can be obtained through
hosting a malicious .cbo file which will be downloaded and opened

== Solutions ==

- Install the vendor supplied patch.

== Credit ==

Discovered and advised to Microsoft May, 2006 by Brett Moore of

== About Security-Assessment.com ==

Security-Assessment.com is Australasia's leading team of Information
Security consultants specialising in providing high quality Information
Security services to clients throughout the Asia Pacific region. Our
clients include some of the largest globally recognised companies in
areas such as finance, telecommunications, broadcasting, legal and
government. Our aim is to provide the very best independent advice and
a high level of technical expertise while creating long and lasting
professional relationships with our clients.

Security-Assessment.com is committed to security research and
development, and its team continues to identify and responsibly publish
vulnerabilities in public and private software vendor's products.
Members of the Security-Assessment.com R&D team are globally recognised
through their release of whitepapers and presentations related to new
security research.

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus