Vulnerabilities > CVE-2008-4256 - Resource Management Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The Charts ActiveX control in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "Charts Control Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS08-070 |
bulletin_url | |
date | 2008-12-09T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 932349 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution |
Nessus
NASL family Windows NASL id SMB_KB_960715.NASL description The remote host is missing a list of kill bits for ActiveX controls that are known to contain vulnerabilities. If these ActiveX controls are ever installed on the remote host, either now or in the future, they would expose it to various security issues. last seen 2020-06-01 modified 2020-06-02 plugin id 35634 published 2009-02-11 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35634 title MS KB960715: Cumulative Security Update of ActiveX Kill Bits code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(35634); script_version("1.32"); script_cvs_date("Date: 2018/11/15 20:50:28"); script_cve_id( "CVE-2008-4252", "CVE-2008-4253", "CVE-2008-4254", "CVE-2008-4255", "CVE-2008-4256", "CVE-2009-0305" ); script_bugtraq_id(33663); script_xref(name:"IAVA", value:"2008-A-0088"); script_xref(name:"IAVA", value:"2009-A-0016"); script_xref(name:"IAVB", value:"2009-B-0009"); script_xref(name:"MSKB", value:"960715"); script_name(english:"MS KB960715: Cumulative Security Update of ActiveX Kill Bits"); script_summary(english:"Determines if the newest kill bits are set"); script_set_attribute(attribute:"synopsis", value: "The remote Windows host is missing a security update containing ActiveX kill bits."); script_set_attribute(attribute:"description", value: "The remote host is missing a list of kill bits for ActiveX controls that are known to contain vulnerabilities. If these ActiveX controls are ever installed on the remote host, either now or in the future, they would expose it to various security issues."); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2009/960715"); script_set_attribute(attribute:"solution", value: "Microsoft has released an advisory for KB960715."); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack'); script_cwe_id(119, 189, 264, 399); script_set_attribute(attribute:"plugin_publication_date", value:"2009/02/11"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe",value:"cpe:/o:microsoft:windows"); script_set_attribute(attribute:"stig_severity", value:"I"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_family(english:"Windows"); script_dependencies("smb_hotfixes.nasl"); script_require_keys("SMB/Registry/Enumerated", "SMB/WindowsVersion"); script_require_ports(139, 445); exit(0); } include("smb_func.inc"); include("smb_hotfixes.inc"); include("smb_activex_func.inc"); if (!get_kb_item("SMB/Registry/Enumerated")) exit(0, "The 'SMB/Registry/Enumerated' KB item is missing."); if (hotfix_check_sp(win2k:6, xp:4, win2003:3, vista:2) <= 0) exit(0, "The host is not affected based on its version / service pack."); if (hotfix_check_server_core() == 1) exit(0, "Windows Server Core installs are not affected."); if (activex_init() != ACX_OK) exit(1, "Unable to initialize the ActiveX API."); # Test each control. info = ""; clsids = make_list( "{FFBB3F3B-0A5A-4106-BE53-DFE1E2340CB1}", "{4788DE08-3552-49EA-AC8C-233DA52523B9}", "{1E216240-1B7D-11CF-9D53-00AA003C9CB6}", "{3A2B370C-BA0A-11d1-B137-0000F8753F5D}", "{B09DE715-87C1-11d1-8BE3-0000F8754DA1}", "{cde57a43-8b86-11d0-b3c6-00a0c90aea82}", "{6262d3a0-531b-11cf-91f6-c2863c385e30}", "{0ECD9B64-23AA-11d0-B351-00A0C9055D8E}", "{C932BA85-4374-101B-A56C-00AA003668DC}", "{248dd896-bb45-11cf-9abc-0080c7e7b78d}" ); foreach clsid (clsids) { if (activex_get_killbit(clsid:clsid) == 0) { info += ' ' + clsid + '\n'; if (!thorough_tests) break; } } activex_end(); if (info) { if (report_verbosity > 0) { if (max_index(split(info)) > 1) s = "s"; else s = ""; report = string( "\n", "The kill bit has not been set for the following control", s, " :\n", "\n", info ); if (!thorough_tests) { report = string( report, "\n", "Note that Nessus did not check whether there were other kill bits\n", "that have not been set because the 'Perofrm thorough tests' setting\n", "was not enabled when this scan was run.\n" ); } security_warning(port:kb_smb_transport(), extra:report); } else security_warning(kb_smb_transport()); }
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS08-070.NASL description The remote host contains a version of the ActiveX control for Visual Basic 6.0 Runtime Extended Files that may allow an attacker to execute arbitrary code on the remote host by constructing a malicious web page and enticing a victim to visit it. Note that this control may have been included with Visual Studio or FoxPro or as part of a third-party application created by one of those products. last seen 2020-06-01 modified 2020-06-02 plugin id 35069 published 2008-12-10 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35069 title MS08-070: Vulnerabilities in Visual Basic 6.0 ActiveX Controls Could Allow Remote Code Execution (932349)
Oval
accepted | 2012-11-12T04:00:32.568-05:00 | ||||||||||||||||
class | vulnerability | ||||||||||||||||
contributors |
| ||||||||||||||||
definition_extensions |
| ||||||||||||||||
description | The Charts ActiveX control in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "Charts Control Memory Corruption Vulnerability." | ||||||||||||||||
family | windows | ||||||||||||||||
id | oval:org.mitre.oval:def:5651 | ||||||||||||||||
status | accepted | ||||||||||||||||
submitted | 2008-12-09T13:31:00 | ||||||||||||||||
title | Charts Control Memory Corruption Vulnerability | ||||||||||||||||
version | 68 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 32614 CVE(CAN) ID: CVE-2008-4256 Visual Basic是用来创建高性能的企业应用程序及基于Web的应用程序的工具。 Visual Basic所安装的图表ActiveX控件(Mschrt20.ocx)在处理恶意输入参数时存在内存破坏漏洞。攻击者可以通过构造特制网页来利用该漏洞,当用户查看网页时,就可以触发这个漏洞。成功利用此漏洞的攻击者可以获得与登录用户相同的用户权限。 Microsoft Visual Basic 6.0 Microsoft Visual Studio .NET 2003 SP1 Microsoft Visual Studio .NET 2002 SP1 Microsoft Visual FoxPro 9.0 SP2 Microsoft Visual FoxPro 9.0 SP1 Microsoft Visual FoxPro 8.0 SP1 临时解决方法: * 禁止在Internet Explorer中运行图表ActiveX控件。请将以下文本粘贴于记事本等文本编辑器中,然后使用.reg文件扩展名保存文件。 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{3A2B370C-BA0A-11d1-B137-0000F8753F5D}] "Compatibility Flags"=dword:00000400 可以通过双击此.reg文件将其应用到各个系统,还可以使用组策略跨域应用该文件。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-070)以及相应补丁: MS08-070:Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution (932349) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/ms08-070.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/ms08-070.mspx?pf=true</a> |
id | SSV:4550 |
last seen | 2017-11-19 |
modified | 2008-12-11 |
published | 2008-12-11 |
reporter | Root |
title | Microsoft图表ActiveX控件内存破坏漏洞(MS08-070) |
References
- http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm
- http://www.securityfocus.com/bid/32614
- http://www.securityfocus.com/bid/32614
- http://www.securitytracker.com/id?1021369
- http://www.securitytracker.com/id?1021369
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.vupen.com/english/advisories/2008/3382
- http://www.vupen.com/english/advisories/2008/3382
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5651
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5651