Vulnerabilities > CVE-2010-3138

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
bsplayer
critical
nessus
exploit available

Summary

Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information. Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 - 'Untrusted Search Path Vulnerability'

Vulnerable Configurations

Part Description Count
Application
Microsoft
1
Application
Bsplayer
1
OS
Microsoft
1

Exploit-Db

  • descriptionMediaplayer Classic 1.3.2189.0 DLL Hijacking Exploit (iacenc.dll). CVE-2010-3138. Local exploit for windows platform
    fileexploits/windows/local/14765.c
    idEDB-ID:14765
    last seen2016-02-01
    modified2010-08-25
    platformwindows
    port
    published2010-08-25
    reporterEncrypt3d.M!nd
    sourcehttps://www.exploit-db.com/download/14765/
    titleMediaplayer Classic 1.3.2189.0 - DLL Hijacking Exploit iacenc.dll
    typelocal
  • descriptionMedia Player Classic 6.4.9.1 DLL Hijacking Exploit (iacenc.dll). CVE-2010-3138. Local exploit for windows platform
    fileexploits/windows/local/14788.c
    idEDB-ID:14788
    last seen2016-02-01
    modified2010-08-25
    platformwindows
    port
    published2010-08-25
    reporterLiquidWorm
    sourcehttps://www.exploit-db.com/download/14788/
    titleMedia Player Classic 6.4.9.1 DLL Hijacking Exploit iacenc.dll
    typelocal

Msbulletin

bulletin_idMS12-014
bulletin_url
date2012-02-14T00:00:00
impactRemote Code Execution
knowledgebase_id2661637
knowledgebase_url
severityImportant
titleVulnerability in Indeo Codec Could Allow Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS12-014.NASL
descriptionThe remote Windows XP host contains a version of the Indeo codec that is affected by an insecure library loading vulnerability. A remote attacker could exploit this by tricking a user into opening a legitimate file (e.g., an .avi file) located in the same directory as a maliciously crafted dynamic link library (DLL) file, resulting in arbitrary code execution.
last seen2020-06-01
modified2020-06-02
plugin id57948
published2012-02-14
reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/57948
titleMS12-014: Vulnerability in Indeo Codec Could Allow Remote Code Execution (2661637)
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(57948);
  script_version("1.11");
  script_cvs_date("Date: 2018/11/15 20:50:31");

  script_cve_id("CVE-2010-3138");
  script_bugtraq_id(42730);
  script_xref(name:"EDB-ID", value:"14765");
  script_xref(name:"EDB-ID", value:"14788");
  script_xref(name:"MSFT", value:"MS12-014");
  script_xref(name:"Secunia", value:"41114");
  script_xref(name:"MSKB", value:"2661637");

  script_name(english:"MS12-014: Vulnerability in Indeo Codec Could Allow Remote Code Execution (2661637)");
  script_summary(english:"Checks version of Iacenc.dll");

  script_set_attribute(
    attribute:"synopsis",
    value:
"Arbitrary code can be executed on the remote Windows host through the
Indeo codec."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Windows XP host contains a version of the Indeo codec that
is affected by an insecure library loading vulnerability.

A remote attacker could exploit this by tricking a user into opening a
legitimate file (e.g., an .avi file) located in the same directory as
a maliciously crafted dynamic link library (DLL) file, resulting in
arbitrary code execution."
  );
  script_set_attribute(attribute:"see_also", value:"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php");
  script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-014");
  script_set_attribute(attribute:"solution", value:"Microsoft has released a patch for Windows XP.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/08/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/02/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/02/14");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows_xp");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows : Microsoft Bulletins");

  script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
  script_require_keys("SMB/MS_Bulletin_Checks/Possible");
  script_require_ports(139, 445, "Host/patch_management_checks");

  exit(0);
}

include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');

bulletin = 'MS12-014';
kb = '2661637';
kbs = make_list(kb);

if (get_kb_item('Host/patch_management_checks'))
  hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);


# The advisory says only XP SP3 is vulnerable
win_ver = get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);
sp = get_kb_item_or_exit("SMB/CSDVersion");
sp = ereg_replace(pattern:".*Service Pack ([0-9]).*", string:sp, replace:"\1");
sp = int(sp);
if (win_ver != '5.1' || sp != 3)
  exit(0, 'Only Windows XP SP3 is affected.');

if (!is_accessible_share())
  exit(1, 'is_accessible_share() failed.');

file = "\system32\Iacenc.dll";
r = hotfix_check_fversion(file:file, version:'1.0.0.0', bulletin:bulletin, kb:kb);
if (r == HCF_OLDER || r == HCF_NOENT)  # file out of date or FNF
{
  if (r == HCF_NOENT)
  {
    path = hotfix_get_systemroot() + file;
    info = '\nThe following file was not found :\n\n' + path + '\n\nThis indicates KB' + kb + ' is missing.\n';
    hotfix_add_report(info);
  }

  set_kb_item(name:'SMB/Missing/' + bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  exit(0, 'The host is not affected.');
}

Oval

accepted2012-03-12T04:00:45.706-04:00
classvulnerability
contributors
  • nameSecPod Team
    organizationSecPod Technologies
  • nameDragos Prisaca
    organizationSymantec Corporation
definition_extensions
commentMicrosoft Windows XP (x86) SP3 is installed
ovaloval:org.mitre.oval:def:5631
descriptionUntrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.
familywindows
idoval:org.mitre.oval:def:7132
statusaccepted
submitted2010-09-23T15:01:11
titleIndeo Codec Insecure Library Loading Vulnerability
version75