vendor:
Crystal Reports
by:
shinnai
7.5
CVSS
HIGH
Buffer-Overflow
120 (Buffer Copy without Checking Size of Input)
CWE
Product Name: Crystal Reports
Affected Version From: 11
Affected Version To: 11
Patch Exists: YES
Related CWE: N/A
CPE: a:business_objects:crystal_reports:11
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP Professional
2007
Application: Crystal Reports XI Release 2 (Enterprise Tree Control) Remote BoF/Dos
The problem is a buffer-overflow which occours when you use the 'SelectedSession()' method. It seems that, during the initialization of the component, a race condition occours between threads and 4 bytes of the same component will overwrite EIP. If you patch these 4 bytes, you can control this register, using it to jump to a shellcode and execute arbitrary code on user's pc. For exploiting this vulnerability you only need to create a web page containing the CLSID and the codebase path to your crafted ActiveX.
Mitigation:
Patch the 4 bytes of the component to prevent the buffer-overflow.