Vulnerability Note VU#441785
SupportSoft ActiveX controls contain multiple buffer overflows
Overview
The SupportSoft ActiveX controls contain multiple buffer overflow vulnerabilities, which could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
SupportSoft provides multiple ActiveX packages that are used by third party vendors to provide remote assistance and other technical support functions. The controls are commonly used by internet service providers (ISPs) and PC manufacturers. The SupportSoft ActiveX control packages contain multiple buffer overflow vulnerabilities. Many of these buffer overflows can be used to overwrite the process Structured Exception Handler (SEH) or otherwise overwrite the contents of the EIP (Extended Instruction Pointer) register, thus gaining control of program execution flow. According to the SupportSoft ActiveX Controls Security Update, one should search for any of the following files to determine if a system may be vulnerable:
tgctlins.dll sdcnetcheck.dll tgctlar.dll tgctlch.dll tgctlpr.dll tgctlcm.dll tglib.dll tgctlidx.dll |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash. |
Solution
Apply an update |
{01010e00-5e80-11d8-9e86-0007e96c65ae} {01011300-5e80-11d8-9e86-0007e96c65ae} {01013A00-5E80-11D8-9E86-0007E96C65AE} {01013B00-5E80-11D8-9E86-0007E96C65AE} {01013C00-5E80-11D8-9E86-0007E96C65AE} {01013D00-5E80-11D8-9E86-0007E96C65AE} {01013F00-5E80-11D8-9E86-0007E96C65AE} {01014000-5E80-11D8-9E86-0007E96C65AE} {01014100-5E80-11D8-9E86-0007E96C65AE} {01014B00-5E80-11D8-9E86-0007E96C65AE} {01111c00-3e00-11d2-8470-0060089874ed} {01111e00-3e00-11d2-8470-0060089874ed} {01111f00-3e00-11d2-8470-0060089874ed} {01112500-3e00-11d2-8470-0060089874ed} {01112800-3e00-11d2-8470-0060089874ed} {01113300-3e00-11d2-8470-0060089874ed} {01114200-3e00-11d2-8470-0060089874ed} {01114300-3e00-11d2-8470-0060089874ed} {01114400-3e00-11d2-8470-0060089874ed} {01114500-3e00-11d2-8470-0060089874ed} {01114600-3e00-11d2-8470-0060089874ed} {01114700-3e00-11d2-8470-0060089874ed} {01114800-3e00-11d2-8470-0060089874ed} {01116e00-3e00-11d2-8470-0060089874ed} More information about how to set the kill bit is available in Microsoft Support Document 240797. Alternatively, the following text can be saved as a .REG file and imported to set the kill bit for these controls:
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01010200-5e80-11d8-9e86-0007e96c65ae}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01010e00-5e80-11d8-9e86-0007e96c65ae}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01011300-5e80-11d8-9e86-0007e96c65ae}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013A00-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013B00-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013C00-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013D00-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013F00-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01014000-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01014100-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01014B00-5E80-11D8-9E86-0007E96C65AE}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01111c00-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01111e00-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01111f00-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01112500-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01112800-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01113300-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114200-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114300-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114400-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114500-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114600-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114700-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114800-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01116e00-3e00-11d2-8470-0060089874ed}] "Compatibility Flags"=dword:00000400 Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document. |
Systems Affected (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
BellSouth | Affected | - | 20 Feb 2007 |
Comcast | Affected | - | 20 Feb 2007 |
IBM Corporation | Affected | - | 20 Feb 2007 |
SupportSoft, Inc. | Affected | 21 Aug 2006 | 22 Feb 2007 |
Symantec, Inc. | Affected | 21 Aug 2006 | 22 Feb 2007 |
TDC | Affected | - | 20 Feb 2007 |
Time Warner | Affected | - | 20 Feb 2007 |
3M | Unknown | - | 20 Feb 2007 |
Automatic Data Processing | Unknown | - | 20 Feb 2007 |
Bank of America | Unknown | - | 21 Feb 2007 |
Belgacom | Unknown | - | 20 Feb 2007 |
Bharti Enterprises | Unknown | - | 20 Feb 2007 |
Bresnan Communications | Unknown | - | 20 Feb 2007 |
BT | Unknown | - | 20 Feb 2007 |
Casema | Unknown | - | 20 Feb 2007 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A | N/A |
References
- http://www.cert.org/tech_tips/securing_browser/#Internet_Explorer
- http://www.supportsoft.com/support/controls_update.asp
- http://www.supportsoft.com/support/Security%20Advisory%202006-01-V2007.pdf
- http://www.symantec.com/avcenter/security/Content/2007.02.22.html
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=478
- http://support.microsoft.com/kb/240797
- http://secunia.com/advisories/24246/
- http://secunia.com/advisories/24251/
- http://news.com.com/Flaws+in+tech+support+tools+open+PCs+to+attack/2100-1002_3-6162278.html
- http://www.securityfocus.com/bid/22564
Credit
This vulnerability was reported by Will Dormann of CERT/CC. It was also independently discovered by Mark Litchfield of NGS Software and Peter Vreugdenhil.
This document was written by Will Dormann.
Other Information
- CVE IDs: CVE-2006-6490
- Date Public: 22 Feb 2007
- Date First Published: 23 Feb 2007
- Date Last Updated: 13 Apr 2009
- Severity Metric: 15.15
- Document Revision: 33
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.