9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.244 Low
EPSS
Percentile
96.6%
An ActiveX control used to uninstall XCP Digital Rights Management (DRM) software made by First 4 Internet and distributed on some Sony BMG audio CDs is marked “Safe for scripting”
XCP Digital Rights Management (DRM) software by First 4 Internet, which is distributed by some Sony BMG audio CDs. The XCP copy protection software uses “rootkit” technology to hide certain files from the user. A problem has been reported in an ActiveX control used to uninstall this software.
It has been reported that upon submitting a request to uninstall the DRM software, the user will receive via email a link to a Sony BMG web page. This page will attempt to install an ActiveX control when it is displayed in Internet Explorer. This ActiveX control is marked “Safe for scripting,” which means that any web page may be able to utilize the control and its methods. Some of the methods provided by this control appear to present security problems, as they may allow an attacker to download and execute arbitrary code.
It has been reported the ActiveX control used to uninstall XCP DRM software may allow remote attackers to download and execute arbitrary code on vulnerable systems. The ActiveX control will only execute code that is packaged in a certain file format.
Set the kill-bit for CLSID {4EA7C4C5-C5C0-4F5C-A008-8293505F71CC} after uninstalling the XCP DRM software.
As an alternative, disable ActiveX controls in Internet Explorer after uninstalling the XCP DRM software. Removing the vulnerable control may also limit the potential risk reported for the CodeSupport control:
cmd /k del “%windir%\downloaded program files\codesupport.ocx”
Javascript is disabled. Click here to view vendors.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This report has been publicly credited to Matti Nikki, with additional information provided by J. Alex Halderman and Ed Felten.
This document was written by Jeffrey Havrilla.
CVE IDs: | CVE-2005-3650 |
---|---|
Severity Metric: | 7.76 Date Public: |