|Main Archive Page > Month Archives > full-disclosure-uk archives|
NOTE: Other versions may also be affected.
Rating: Highly critical
Impact: System compromise
"Share, Discover and Download music and videos."
Secunia Research has discovered a vulnerability in BearShare, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the NCTAudioFile2.AudioFile ActiveX control when handling the "SetFormatLikeSample()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (about 4124 bytes) as argument to the affected method.
Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.
Set the kill-bit for the affected ActiveX control.
30/04/2007 - Vendor notified.
09/05/2007 - Public disclosure.
Discovered by Carsten Eiram, Secunia Research.
The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2007-0018 for the vulnerability.
Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:
Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.
Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:
Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:
Secunia offers a FREE mailing list called Secunia Security Advisories:
Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2007-50/
Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/