Vulnerabilities > CVE-2007-0018 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products

047910
CVSS 9.3 - CRITICAL

Summary

Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x.

Vulnerable Configurations

Part Description Count
Application
Altdo
2
Application
Americanshareware
1
Application
Audio_Edit_Magic
1
Application
Bearshare
1
Application
Cdburnerxp
1
Application
Cheetahburner
2
Application
Code-It_Softare
2
Application
Dandans_Digital_Media_Products
4
Application
Digital_Borneo
1
Application
Easy_Ringtone_Maker
1
Application
Expstudio
1
Application
Iaudiosoft.Com
3
Application
Imesh.Com
1
Application
J_Hepple_Products
9
Application
Joshua_Mediasoft
2
Application
Magicvideosoftare
3
Application
Mcfunsoft
6
Application
Mediatox
1
Application
Movavi
6
Application
Mp3-Soft
1
Application
Mystik_Media_Products
4
Application
Nctsoft_Products
4
Application
Nextlevel_Systems
2
Application
Quikscribe
2
Application
Recordnrip
1
Application
Rmbsoft
2
Application
Roemer_Software
3
Application
Sienzo
1
Application
Smart_Media_Systems
1
Application
Softdiv_Softare
5
Application
Virtual_Cd
4
Application
Xrlly_Software
3
Application
Xwaver.Com
2

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Exploit-Db

  • descriptionIE NCTAudioFile2.AudioFile ActiveX Remote Stack Overflow Exploit 2. CVE-2007-0018. Remote exploit for windows platform
    idEDB-ID:3808
    last seen2016-01-31
    modified2007-04-27
    published2007-04-27
    reportershinnai
    sourcehttps://www.exploit-db.com/download/3808/
    titleMicrosoft Internet Explorer - NCTAudioFile2.AudioFile ActiveX Remote Stack Overflow Exploit 2
  • descriptionNCTAudioFile2 v2.x ActiveX Control SetFormatLikeSample() Buffer Overflow. CVE-2007-0018. Remote exploit for windows platform
    idEDB-ID:16603
    last seen2016-02-02
    modified2010-07-03
    published2010-07-03
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16603/
    titleNCTAudioFile2 2.x - ActiveX Control SetFormatLikeSample Buffer Overflow
  • descriptionIE NCTAudioFile2.AudioFile ActiveX Remote Overflow Exploit. CVE-2007-0018. Remote exploit for windows platform
    idEDB-ID:3728
    last seen2016-01-31
    modified2007-04-13
    published2007-04-13
    reporterInTeL
    sourcehttps://www.exploit-db.com/download/3728/
    titleMicrosoft Internet Explorer - NCTAudioFile2.AudioFile ActiveX Remote Overflow Exploit

Metasploit

descriptionThis module exploits a stack buffer overflow in the NCTAudioFile2.Audio ActiveX Control provided by various audio applications. By sending an overly long string to the "SetFormatLikeSample()" method, an attacker may be able to execute arbitrary code.
idMSF:EXPLOIT/WINDOWS/BROWSER/NCTAUDIOFILE2_SETFORMATLIKESAMPLE
last seen2020-02-29
modified2017-07-24
published2009-12-14
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0018
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb
titleNCTAudioFile2 v2.x ActiveX Control SetFormatLikeSample() Buffer Overflow

Packetstorm

References