Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> CDDBControl ActiveX Control Buffer Overflow Vulnerability


Vulnerability Assessment Details

CDDBControl ActiveX Control Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Checks for the CDDBControl ActiveX control

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote Windows host has an ActiveX control that is susceptible
to a buffer overflow vulnerability.

Description :

The Windows remote host contains the GraceNote CDDBControl ActiveX
control, which is used by various products, including AOL's software,
to lookup CD information in the GraceNote CDDB and is commonly marked
as safe for scripting.

The version of this ActiveX control on the remote host reportedly
contains a buffer overflow vulnerability that arises when a large
string is supplied as an option for the control. A remote attacker
may be able to leverage this issue to execute arbitrary code on the
remote host subject to the rights of the current user.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-06-019.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047420.html
http://www.gracenote.com/music/corporate/FAQs.html/faqset=security/page=0
http://secunia.com/secunia_research/2006-69/advisory/

Solution :

Contact the developer of the software you are using for a patch or
new version
otherwise, use Gracenote's tool to set its 'kill' bit
to disable the control in Internet Explorer.

Network Security Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Networks Security ID: 18678

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R730 8 BAY TWO E5-2603V3 1.6GHZ 768GB 8 X 600GB 15K SAS H730
$12039.0
DELL POWEREDGE R730 8 BAY TWO E5-2603V3 1.6GHZ 768GB 8 X 600GB 15K SAS H730 pictureDELL POWEREDGE R730 LFF 8 BAY TWO E5-2680V3 2.5GHZ 256GB 8 X 600GB 15K SAS H330
$12739.0
DELL POWEREDGE R730 LFF 8 BAY TWO E5-2680V3 2.5GHZ 256GB 8 X 600GB 15K SAS H330 pictureDELL POWEREDGE R730 LFF 8 BAY TWO E5-2650V4 2.2GHZ 384GB 2 X 2TB SAS H330
$10999.0
DELL POWEREDGE R730 LFF 8 BAY TWO E5-2650V4 2.2GHZ 384GB 2 X 2TB SAS H330 pictureDELL POWEREDGE R730 8 BAY TWO E5-2640V3 2.6GHZ 192GB 8 X 600GB 15K 12G H730
$8029.0
DELL POWEREDGE R730 8 BAY TWO E5-2640V3 2.6GHZ 192GB 8 X 600GB 15K 12G H730 picture


Discussions

No Discussions have been posted on this vulnerability.