Vigil@nce: Windows, buffer overflow of UpdateFrameTitleForDocument
July 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
An attacker can invite the victim to open a document with an
application which changes the title of the window with
UpdateFrameTitleForDocument(), in order to execute code on his
computer.
– Severity: 1/4
– Creation date: 06/07/2010
DESCRIPTION OF THE VULNERABILITY
The mfc42.dll library provides the class CFrameWnd, containing the
UpdateFrameTitleForDocument() method which changes the name of the
window:
public void UpdateFrameTitleForDocument(LPCTSTR lpszDocName);
However, if the lpszDocName parameter is too long, a buffer
overflow occurs. This overflow leads to code execution with
privileges of the current user.
A remote attacker cannot directly exploit this vulnerability.
However, some applications such as Trident Software PowerZip
change the title from data coming from an untrusted source (a ZIP
file in this case).
An attacker can therefore invite the victim to open a document
with an application which changes the title of the window with
UpdateFrameTitleForDocument(), in order to execute code on his
computer.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-buffer-overflow-of-UpdateFrameTitleForDocument-9740