Vigil@nce: IE, vulnerabilities of several ActiveX of November 2008
November 2008 by Vigil@nce
SYNTHESIS
Several ActiveX can be used by a remote attacker to generate a
denial of service or to execute code.
Gravity: 2/4
Consequences: user access/rights, data reading, data
creation/edition
Provenance: document
Means of attack: 1 attack
Ability of attacker: technician (2/4)
Confidence: confirmed by a trusted third party (4/5)
Diffusion of the vulnerable configuration: high (3/3)
Number of vulnerabilities in this bulletin: 3
Creation date: 05/11/2008
IMPACTED PRODUCTS
– Microsoft Internet Explorer
DESCRIPTION
Several ActiveX can be used by a remote attacker to generate a
denial of service or to execute code.
An attacker can use the WriteFile() method of the Chilkat Crypt
ChilkatCrypt2.dll ActiveX in order to corrupt a file on victim’s
computer. [grav:2/4; BID-32073]
An attacker can create a buffer overflow in the getPlus Download
Manager gp.ocx ActiveX. This ActiveX is for example installed by
Adobe Reader. [grav:2/4; BID-32103, BID-32105, CVE-2008-4817]
An attacker can use the SAP AG SAPgui MDrmSap mdrmsap.dll ActiveX
in order to execute code on victim’s computer. [grav:2/4;
BID-32186, CVE-2008-4387, VU#277313]
CHARACTERISTICS
Identifiers: BID-32073, BID-32103, BID-32105, BID-32186,
CVE-2008-4387, CVE-2008-4817, VIGILANCE-VUL-8222, VU#277313