CVE ID | CVE-2015-8039 |
CVSS SCORE | 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P |
AFFECTED VENDORS |
Samsung |
AFFECTED PRODUCTS |
SmartViewer |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['19457']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
The specific flaw exists within the STWAxConfigNVR control's SendCustomPacket method. The control contains an untrusted pointer dereference vulnerability. It dereferences an attacker-supplied memory address. An attacker can exploit this condition to achieve code execution under the context of the browser process. |
ADDITIONAL DETAILS |
02/04/2015 - ZDI disclosed vulnerability details to the vendor (ZDI sent to known contacts, but received no initial ACK) -- Mitigation: The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\EEDBA32E-5C2D-48f1-A58E-0AAB0BC230E3 If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. -- Vendor Mitigation: We have resolved below issues as removing DVR setup function of N company. Resolved Version : SmartViewer v4.6.0 (August 2015) ~ v4.9.1 (Current Final Version)
|
DISCLOSURE TIMELINE |
|
CREDIT | Ariele Caltabiano (kimiya) |