search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Consona (formerly SupportSoft) Intelligent Assistance Suite (IAS) cross-site scripting, ActiveX, and Repair Service vulnerabilities

Vulnerability Note VU#602801

Original Release Date: 2010-05-06 | Last Revised: 2010-05-18

Overview

Consona (formerly SupportSoft) Intelligent Assistance Suite (IAS) contains a set of vulnerabilities that collectively could allow an attacker to execute arbitrary code on a remote system.

Description

In 2009, Consona acquired SupportSoft's enterprise software assets, including web-based assistance software called Intelligent Assistance Suite (IAS). IAS client components are delivered via ActiveX controls, Netscape-style plugins, or standalone installers. IAS runs on Microsoft Windows platforms. Consona products affected by these vulnerabilities include Consona Live Assistance, Consona Dynamic Agent, Consona Subscriber Assistance, Repair Manager, Consona Subscriber Activiation, and Subscriber Agent.

IAS contains vulnerabilities in different components.

    1. Cross-site scripting (XSS) in ns6plugindestructor.asp
    2. Unsafe methods provided by SdcUser.TgConCtl ActiveX control (tgctlcm.dll)
    3. Buffer overflow in SdcUser.TgConCtl ActiveX control (tgctlcm.dll)
    4. Local privilege elevation in Repair Service (tgsrv.exe) (only installed on Windows Vista and Windows 7)
    Using several of these vulnerabilities, an attacker can execute arbitrary code on a vulnerable system. For example, the XSS vulnerability can be used to instantiate the SdcUser.TgConCtl control, which then can be used to download and execute arbitrary programs using the unsafe methods provided by the control. The Repair Service can be used to elevate from user (or Low-Rights IE) privileges to SYSTEM.

    Further details are available in Rubén Santamarta's slides from Rooted CON 2010.

    Impact

    By convincing a user to view a specially crafted HTML document (web page, HTML email message), an attacker could execute arbitrary code with the privileges of the user, and possibly gain SYSTEM privileges via the Repair Service.

    Solution

    Apply patches
    Sites providing IAS/Consona support services should apply the appropriate patches referenced in the April 2010 Security Bulletin.


    Remove n6plugindestructor.asp

    To remove the initial cross-site scripting vector, sites providing IAS/Consona support services can remove ns6plugindestructor.asp from the support web site. Removing this file is unlikely to reduce functionality, but may have side effects.

    Limit domain access to the SdcUser.TgConCtl ActiveX control

    SupportSoft ActiveX controls can only be scripted from sites that contain valid license information. Following the guidance in the April 2010 Security Bulletin, sites providing IAS/Consona support services can augment domain access restrictions by listing allowed domains in the Windows registry and hosting controls using HTTPS to reduce the possibility of DNS spoofing attacks.

    Disable the SdcUser.TgConCtl ActiveX control in Internet Explorer

    Web clients of IAS/Consona support services can disable the vulnerable ActiveX control in Internet Explorer by setting the kill bit for the following CLSID:

    {01113300-3E00-11D2-8470-0060089874ED}

    More information about how to set the kill bit is available in Microsoft Support Document 240797. Alternatively, the following text can be saved as a .reg file and imported into the Windows registry:

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{01113300-3E00-11D2-8470-0060089874ED}]
    "Compatibility Flags"=dword:00000400
    Disabling this control will likely reduce functionality.

    Vendor Information

    602801
     
    Affected   Unknown   Unaffected

    Consona

    Notified:  March 26, 2010 Updated:  May 18, 2010

    Statement Date:   April 06, 2010

    Status

      Affected

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    Please see the April 2010 Security Bulletin.

    Vendor References


    CVSS Metrics

    Group Score Vector
    Base N/A N/A
    Temporal N/A N/A
    Environmental N/A

    References

    Acknowledgements

    This information is based on research by Rubén Santamarta. Thanks to Rubén and Consona for following responsible vulnerability disclosure practices.

    This document was written by Art Manion.

    Other Information

    CVE IDs: None
    Severity Metric: 15.52
    Date Public: 2010-03-19
    Date First Published: 2010-05-06
    Date Last Updated: 2010-05-18 20:02 UTC
    Document Revision: 27

    Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.