Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer Overflow Vulnerability
BID:30814
Info
Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 30814 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2008-5232 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 22 2008 12:00AM |
| Updated: | May 07 2015 05:24PM |
| Credit: | Jeremy Brown |
| Vulnerable: |
Microsoft Windows Media Services 0 Microsoft Windows 2000 Server Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Advanced Server Microsoft nskey.dll 4.1 .3917 |
| Not Vulnerable: | |
Discussion
Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer Overflow Vulnerability
The Microsoft Windows Media Services ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
'nskey.dll' 4.1.00.3917 is vulnerable; other versions may also be affected.
The Microsoft Windows Media Services ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
'nskey.dll' 4.1.00.3917 is vulnerable; other versions may also be affected.
Exploit / POC
Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer Overflow Vulnerability
To exploit this issue an attacker must entice an unsuspecting user to open a malicious web document.
NOTE: Symantec has detected evidence of this issue being actively exploited in the wild.
The following proof-of-concept code is available:
To exploit this issue an attacker must entice an unsuspecting user to open a malicious web document.
NOTE: Symantec has detected evidence of this issue being actively exploited in the wild.
The following proof-of-concept code is available:
Solution / Fix
Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer Overflow Vulnerability
References:
References:
- Microsoft Knowledge Base Article 240797 (Microsoft)
- Microsoft Windows Media Services Homepage (Microsoft)