VUPEN Security Research - Microsoft Internet Explorer CSS @import Memory Corruption (Pwn2Own 2014)

2014-07-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer CSS @import Memory
Corruption (Pwn2Own 2014)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free vulnerability when
manipulating CSS @import statements through addImport() or
removeImport(), which could be exploited by attackers to leak
arbitrary memory or execute arbitrary code via a malicious web page.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9


IV. SOLUTION


Apply MS14-037 security update.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

https://technet.microsoft.com/library/security/ms14-037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1763


VIII. DISCLOSURE TIMELINE
-

2014-01-24 - Vulnerability Discovered by VUPEN Security
2014-03-14 - Vulnerability Reported to ZDI / Microsoft During Pwn2Own 2014
2014-07-08 - Vulnerability Fixed by Microsoft
2014-07-16 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer Request Object Confusion Sandbox Bypass (Pwn2Own 2014)

2014-07-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer Request Object
Confusion Sandbox Bypass (Pwn2Own 2014)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by an object confusion vulnerability when
processing object types within data shared between the broker and
sandboxed processes, which could be exploited by a sandboxed process
to achieve code execution within the broker context and bypass IE
Protected Mode sandbox.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8


IV. SOLUTION


Apply MS14-035 security update.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

https://technet.microsoft.com/library/security/ms14-035
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1764


VIII. DISCLOSURE TIMELINE
-

2011-11-30 - Vulnerability Discovered by VUPEN Security
2014-03-14 - Vulnerability Reported to ZDI and Microsoft During Pwn2Own 2014
2014-06-10 - Vulnerability Fixed by Microsoft
2014-07-16 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer ShowSaveFileDialog() Sandbox Bypass (Pwn2Own 2014)

2014-07-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer
ShowSaveFileDialog() Protected Mode Sandbox Bypass (Pwn2Own 2014)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused due to an invalid handling of a sequence
of actions aimed to save a file when calling ShowSaveFileDialog(),
which could be exploited by a sandboxed process to write files to
arbitrary locations on the system and bypass IE Protected Mode sandbox.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8


IV. SOLUTION


Apply MS14-035 security update.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

https://technet.microsoft.com/library/security/ms14-035
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2777


VIII. DISCLOSURE TIMELINE
-

2011-02-12 - Vulnerability Discovered by VUPEN Security
2014-03-14 - Vulnerability Reported to ZDI and Microsoft During Pwn2Own 2014
2014-06-10 - Vulnerability Fixed by Microsoft
2014-07-16 - Public disclosure



VUPEN Security Research - Microsoft Windows DirectShow Privilege Escalation Vulnerability (Pwn2Own 2014)

2014-07-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows DirectShow Local Privilege
Escalation Vulnerability (Pwn2Own 2014)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and
graphical user interfaces produced by Microsoft. Windows had
approximately 90% of the market share of the client operating
systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by an input validation error in DirectShow
when processing and unserializing Stretch objects in memory, which
could be exploited to elevate privileges and execute arbitrary code
in the context of the logged on user, or e.g. bypass Internet
Explorer's Enhanced Protected Mode (EPM) sandbox.


III. AFFECTED PRODUCTS
---

Microsoft Windows 8.1
Microsoft Windows 8
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2 Service Pack 1 and prior
Microsoft Windows 7 Service Pack 1 and prior
Microsoft Windows Server 2008 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 2 and prior


IV. SOLUTION


Apply MS14-041 security update.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

https://technet.microsoft.com/library/security/ms14-041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2780


VIII. DISCLOSURE TIMELINE
-

2014-01-14 - Vulnerability Discovered by VUPEN Security
2014-03-14 - Vulnerability Reported to ZDI and Microsoft During Pwn2Own 2014
2014-07-08 - Vulnerability Fixed by Microsoft
2014-07-16 - Public disclosure



VUPEN Security Research - Adobe Acrobat Reader XI-X AcroBroker Sandbox Bypass (Pwn2Own)

2014-06-03 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat  Reader XI-X AcroBroker
Sandbox Bypass (Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by an input validation error in the
AcroBroker.exe component when processing local file paths, which
could be exploited by attackers to write malicious files to any
location on the disk and bypass Adobe Acrobat's sandbox.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader XI version 11.0.06 and prior
Adobe Acrobat and Reader XI version 10.1.9 and prior


IV. SOLUTION


Upgrade to Adobe Acrobat and Reader XI v11.0.07 or X v10.1.10.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

http://helpx.adobe.com/security/products/reader/apsb14-15.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0512


VIII. DISCLOSURE TIMELINE
-

2013-12-05 - Vulnerability Discovered by VUPEN Security
2014-03-13 - Vulnerability Reported to Adobe During Pwn2Own 2014
2014-05-13 - Vulnerability Fixed by Adobe
2014-05-26 - Public disclosure





VUPEN Security Research - Adobe Acrobat Reader XI-X Barcode Heap Overflow (Pwn2Own)

2014-05-26 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat  Reader XI-X Barcode Heap
Overflow (Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a heap overflow error when processing
the width and height fields of a barcode element in a PDF, which
could be exploited to execute arbitrary code via a malicious PDF file.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader XI version 11.0.06 and prior
Adobe Acrobat and Reader XI version 10.1.9 and prior


IV. SOLUTION


Upgrade to Adobe Acrobat and Reader XI v11.0.07 or X v10.1.10.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

http://helpx.adobe.com/security/products/reader/apsb14-15.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0511


VIII. DISCLOSURE TIMELINE
-

2013-07-31 - Vulnerability Discovered by VUPEN Security
2014-03-13 - Vulnerability Reported to Adobe During Pwn2Own 2014
2014-05-13 - Vulnerability Fixed by Adobe
2014-05-26 - Public disclosure



VUPEN Security Research - Adobe Flash ExternalInterface Use-After-Free Code Execution (Pwn2Own)

2014-04-15 Thread VUPEN Security Research
VUPEN Security Research - Adobe Flash ExternalInterface Use-After-Free
Code Execution (Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Flash Player is a cross-platform browser-based application runtime
that delivers viewing of expressive applications, content, and videos
across screens and browsers. It is installed on 98% of computers.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Flash.

The vulnerability is caused by a use-after-free error when interacting
with the ExternalInterface class from the browser, which could be
exploited to achieve code execution via a malicious web page.


III. AFFECTED PRODUCTS
---

Adobe Flash versions prior to 13.0.0.182


IV. SOLUTION


Upgrade to Adobe Flash v13.0.0.182.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
http://zerodayinitiative.com/advisories/ZDI-14-092/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0506


VIII. DISCLOSURE TIMELINE
-

2014-01-28 - Vulnerability Discovered by VUPEN Security
2014-03-13 - Vulnerability Reported to Adobe During Pwn2Own 2014
2014-04-08 - Vulnerability Fixed by Adobe
2014-04-14 - Public disclosure



VUPEN Security Research - Google Chrome Clipboard::WriteData() Function Sandbox Escape (Pwn2Own)

2014-03-26 Thread VUPEN Security Research
VUPEN Security Research - Google Chrome Clipboard Format Processing
Sandbox Escape (Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Google Chrome is a freeware web browser developed by Google. Chrome
version 28 and beyond uses the WebKit fork Blink. As of 2013,
StatCounter estimates that Google Chrome has a 39% worldwide usage
share of web browsers (Wikipedia).


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Google Chrome.

The vulnerability is caused by an input validation error within the
Clipboard::WriteData() function that does not restrict the value of
the format parameter, which could be exploited to escape Chrome's
sandbox and achieve code execution with Medium integrity level.


III. AFFECTED PRODUCTS
---

Google Chrome versions prior to 33.0.1750.154


IV. SOLUTION


Upgrade to Chrome version version 33.0.1750.154.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_14.html


VIII. DISCLOSURE TIMELINE
-

2013-12-19 - Vulnerability Discovered by VUPEN Security
2014-03-13 - Vulnerability Reported to Google/ZDI During Pwn2Own 2014
2014-03-14 - Vulnerability Fixed by Google
2014-03-26 - Public disclosure



VUPEN Security Research - Google Chrome Blink locationAttributeSetter Use-after-free (Pwn2Own)

2014-03-26 Thread VUPEN Security Research
VUPEN Security Research - Google Chrome Blink locationAttributeSetter
Use-after-free (Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Google Chrome is a freeware web browser developed by Google. Chrome
version 28 and beyond uses the WebKit fork Blink. As of 2013,
StatCounter estimates that Google Chrome has a 39% worldwide usage
share of web browsers (Wikipedia).


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Google Chrome.

The vulnerability is caused by a use-after-free error within the
DocumentV8Internal::locationAttributeSetter() function when processing
document.location objects under certain conditions, which could be
exploited to leak arbitrary memory and/or achieve code execution via a
specially crafted web page.


III. AFFECTED PRODUCTS
---

Google Chrome versions prior to 33.0.1750.154


IV. SOLUTION


Upgrade to Chrome version version 33.0.1750.154.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_14.html


VIII. DISCLOSURE TIMELINE
-

2014-01-26 - Vulnerability Discovered by VUPEN Security
2014-03-13 - Vulnerability Reported to Google/ZDI During Pwn2Own 2014
2014-03-14 - Vulnerability Fixed by Google
2014-03-26 - Public disclosure



VUPEN Security Research - Mozilla Firefox BumpChunk Object Processing Use-after-free (Pwn2Own)

2014-03-26 Thread VUPEN Security Research
VUPEN Security Research - Mozilla Firefox BumpChunk Object Processing
Use-after-free (Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Mozilla Firefox is a free and open-source web browser developed for
Windows, OS X, and Linux, with a mobile version for Android, by the
Mozilla Foundation and its subsidiary, the Mozilla Corporation.
As of February 2014, Firefox has between 12% and 22% of worldwide
usage, according to different sources. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Mozilla Firefox.

The vulnerability is caused by a use-after-free error in the JS engine
when processing BumpChunk objects while the browser is under a memory
pressure, which could be exploited to leak arbitrary memory and/or
achieve code execution via a malicious web page.


III. AFFECTED PRODUCTS
---

Mozilla Firefox versions prior to 28
Mozilla Firefox ESR versions prior to 24.4
Mozilla Thunderbird versions prior to 24.4
Mozilla Seamonkey versions prior to 2.25


IV. SOLUTION


Upgrade to Firefox v28, Firefox ESR v24.4, Thunderbird v24.4 and
Seamonkey v2.25.


V. CREDIT
--

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house RD
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
--

https://www.mozilla.org/security/announce/2014/mfsa2014-30.html


VIII. DISCLOSURE TIMELINE
-

2014-01-19 - Vulnerability Discovered by VUPEN Security
2014-03-12 - Vulnerability Reported to Mozilla/ZDI During Pwn2Own 2014
2014-03-18 - Vulnerability Fixed by Mozilla
2014-03-26 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer Protected Mode Sandbox Bypass (Pwn2Own 2013 / MS13-059)

2013-08-30 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer Protected Mode
Sandbox Bypass (Pwn2Own 2013 / MS13-059)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a memory corruption error in the IE broker
process when copying certain data, which could be exploited by remote
attackers to bypass IE Protected Mode sandbox and execute arbitrary code
with Medium integrity permissions.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 9
Microsoft Internet Explorer 8

Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a private exploit are
available through the VUPEN BAE (Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect their systems
against potential 0-day attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-059 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas of VUPEN Security.


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms13-059
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-03-04 - Vulnerability Discovered by VUPEN and Privately Shared with
Customers
2013-03-06 - Vulnerability Reported to Microsoft During Pwn2Own 2013
2013-08-13 - Vulnerability Fixed by MS13-059
2013-08-30 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer ReplaceAdjacentText Use-after-free (MS13-059)

2013-08-30 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer
ReplaceAdjacentText Use-after-free (MS13-059)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error within the MSHTML
SlayoutRun::GetCharacters() function when replacing a text adjacent to
an element, which could be exploited by remote attackers to compromise a
vulnerable system.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 9
Microsoft Internet Explorer 8

Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a private exploit are
available through the VUPEN BAE (Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect their systems
against potential 0-day attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-059 security update.


VII. CREDIT
--

This vulnerability was discovered by Alexandre of VUPEN Security.


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms13-059
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-09-25 - Vulnerability Discovered by VUPEN and Privately Shared with
Customers
2013-08-13 - Vulnerability Fixed by MS13-059
2013-08-30 - Public disclosure



VUPEN Security Research - Microsoft Windows LdrHotPatchRoutine Remote ASLR Bypass (Pwn2Own 2013 / MS13-063)

2013-08-30 Thread VUPEN Security Research
Microsoft Windows LdrHotPatchRoutine Remote ASLR Bypass (Pwn2Own 2013
/ MS13-063)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by a design error in the
ntdll.LdrHotPatchRoutine
function which can be abused to load an arbitrary library e.g. from a remote
network share, leading to arbitrary code execution and ASLR bypass.


III. AFFECTED PRODUCTS
---

Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a private exploit are
available through the VUPEN BAE (Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect their systems
against potential 0-day attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-063 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas of VUPEN Security.


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms13-063
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-09-15 - Vulnerability Discovered by VUPEN and Privately Shared with
Customers
2013-03-06 - Vulnerability Reported to Microsoft During Pwn2Own 2013
2013-08-13 - Vulnerability Fixed by MS13-063
2013-08-30 - Public disclosure



VUPEN Security Research - Mozilla Firefox Maintenance Service Privilege Escalation Vulnerabilities

2013-07-08 Thread VUPEN Security Research
VUPEN Security Research - Mozilla Firefox Maintenance Service Local
Privilege Escalation Vulnerabilities

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Mozilla Firefox is a free and open source web browser coordinated by
Mozilla Corporation and Mozilla Foundation. As of October 2012, Firefox
has approximately 20% to 24% of worldwide usage share of web browsers,
making it the third most used web browser. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered high risk vulnerabilities
in Mozilla Firefox.

The vulnerabilities are caused by errors in the Mozilla Maintenance Service
on Windows when interacting with local software, which could allow local
unprivileged users to execute arbitrary code with SYSTEM privileges.

It is of course possible to combine these vulnerabilities with a remote
Firefox memory corruption to achieve a remote SYSTEM code execution.


III. AFFECTED PRODUCTS
---

Mozilla Firefox versions prior to 21.0
Mozilla Firefox ESR versions prior to 17.0.6
Mozilla Thunderbird versions prior to 17.0.6
Mozilla Thunderbird ESR versions prior to 17.0.6


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a private exploit will
be available through the VUPEN BAE (Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Mozilla Firefox 21.0 or ESR 17.0.6.

Upgrade to Mozilla Thunderbird or Thunderbird ESR 17.0.6


VII. CREDIT
--

This vulnerability was discovered by Richard L. of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.mozilla.org/security/announce/2013/mfsa2013-44.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

-**-** - Vulnerability Discovered by VUPEN
2013-05-14 - Vulnerability Fixed by Mozilla
2013-07-08 - Public disclosure



VUPEN Security Research - Oracle Java Preloader Click-2-Play Warning Bypass Vulnerability

2013-07-08 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java Applet Preloader Click-2-Play
Warning Bypass Vulnerability

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Java is the foundation for virtually every type of networked application
and is the global standard for developing and delivering mobile
applications,
games, Web-based content, and enterprise software. (Oracle)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by a design error in the Java click-2-play
security warning when the preloader is used, which can be exploited by
remote attackers to load a malicious applet (e.g. taking advantage of
a Java memory corruption vulnerability) without any user interaction


III. AFFECTED PRODUCTS
---

Oracle Java version 7u21 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a private exploit will
be available through the VUPEN BAE (Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Java 7u25 or later.


VII. CREDIT
--

This vulnerability was discovered by Florent H. of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

-**-** - Vulnerability Discovered by VUPEN
2013-06-18 - Vulnerability Fixed in Java 7u25
2013-07-08 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6 VML Remote Integer Overflow (MS13-037 / Pwn2Own)

2013-05-22 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6 VML
Remote Integer Overflow (MS13-037 / Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by an integer overflow error in the vml.dll
component when processing certain undocumented vector graphic properties,
which could be exploited by remote attackers to leak arbitrary memory and
compromise a vulnerable system via a malicious web page.

CVE: CVE-2013-2551


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows RT
Microsoft Windows 8 for 32-bit Systems
Microsoft Windows 8 for x64-based Systems
Microsoft Windows Server 2012
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit will be available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-037 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms13-037
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-11-09 - Vulnerability Discovered by VUPEN
2013-03-06 - Vulnerability Reported to Microsoft During Pwn2Own 2013
2013-05-20 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer 10-9 Object Confusion Sandbox Bypass (MS13-037 / Pwn2Own)

2013-05-22 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer 10-9 Object
Confusion Sandbox Bypass (MS13-037 / Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by an object confusion error in the IE broker
process when processing unexpected variant objects, which could allow an
attacker to execute arbitrary code within the context of the broker process
to bypass Internet Explorer Protected Mode sandbox.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 10
Microsoft Internet Explorer 9

Microsoft Windows RT
Microsoft Windows 8 for 32-bit Systems
Microsoft Windows 8 for x64-based Systems
Microsoft Windows Server 2012
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit will be available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-037 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms13-037
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-11-23 - Vulnerability Discovered by VUPEN
2013-03-06 - Vulnerability Reported to Microsoft During Pwn2Own 2013
2013-05-20 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6 Scroll Use-after-free (MS13-028)

2013-05-03 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6
Scroll Use-after-free (MS13-028)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error in the
CWindow::scroll() function within mshtml.dll when processing specially
crafted Scroll events, which could be exploited by remote attackers to
compromise a vulnerable system via a malicious web page.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows RT
Microsoft Windows 8 for 32-bit Systems
Microsoft Windows 8 for x64-based Systems
Microsoft Windows Server 2012
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-028 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb13-11.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-06-07 - Vulnerability Discovered by VUPEN and shared with VUPEN TPP
customers
2013-04-09 - MS13-028 Released By Microsoft
2013-05-02 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6 CDisplayPointer Use-after-free (MS13-028)

2013-05-03 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6
CDisplayPointer Use-after-free (MS13-028)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error in the
CDisplayPointer::MoveToMarkupPointer() function within mshtml.dll when
processing CDisplayPointer objects, which could be exploited by remote
attackers to compromise a vulnerable system via a malicious web page.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows RT
Microsoft Windows 8 for 32-bit Systems
Microsoft Windows 8 for x64-based Systems
Microsoft Windows Server 2012
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-028 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb13-11.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-04-05 - Vulnerability Discovered by VUPEN and shared with VUPEN TPP
customers
2013-04-09 - MS13-028 Released By Microsoft
2013-05-02 - Public disclosure



VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-19 Thread VUPEN Security Research
VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object
Confusion Code Execution (CVE-2013-2555)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Flash Player is a cross-platform browser-based application runtime
that delivers viewing of expressive applications, content, and videos
across screens and browsers. It is installed on 98% of computers.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Flash Player.

The vulnerability is caused by an object confusion error when processing
malformed Real Time Messaging Protocol (RTMP) data received during the
initial phase of communication with a server, which could be exploited
by remote attackers to compromise a vulnerable system via a malicious
web page.


III. AFFECTED PRODUCTS
---

Adobe Flash Player versions prior to 11.7.700.169


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Flash Player version 11.7.700.169.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb13-11.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-02-15 - Vulnerability Discovered by VUPEN
2013-03-06 - Vulnerability Exploited At Pwn2Own 2013 and Reported to Adobe
2013-04-17 - Public disclosure



VUPEN Security Research - Mozilla Firefox nsHTMLEditRules Use-After-Free (MFSA-2013-29 / CVE-2013-0787)

2013-03-19 Thread VUPEN Security Research
VUPEN Security Research - Mozilla Firefox nsHTMLEditRules
Use-After-Free (MFSA-2013-29 / CVE-2013-0787)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Mozilla Firefox is a free and open source web browser coordinated by
Mozilla Corporation and Mozilla Foundation. As of August 2012, Firefox
has approximately 23% of worldwide usage share of web browsers (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Mozilla Firefox.

The vulnerability is caused by a use-after-free error within the XUL
nsHTMLEditRules::nsHTMLEditRules() function when processing certain
objects, which could be exploited by remote attackers to compromise
a vulnerable system via a malicious web page.

The vulnerability has been exploited during Pwn2Own 2013.


III. AFFECTED PRODUCTS
---

Mozilla Firefox version 19.0.1 and prior
Mozilla Firefox ESR version 17.0.3 and prior
Mozilla Thunderbird version 17.0.3 and prior
Mozilla Thunderbird ESR version 17.0.3 and prior
Mozilla SeaMonkey version 2.16 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to the following versions:

Firefox 19.0.2 or later
Firefox ESR 17.0.4 or later
Thunderbird 17.0.4 or later
Thunderbird ESR 17.0.4 or later
SeaMonkey 2.16.1 or later


VII. CREDIT
--

This vulnerability was discovered and exploited by Chaouki Bekrar, Jordan
Gruskovnjak, and Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

https://www.mozilla.org/security/announce/2013/mfsa2013-29.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2013-02-26 - Vulnerability Discovered by VUPEN
2013-03-06 - Vulnerability Reported to Mozilla by VUPEN During Pwn2Own 2013
2013-03-07 - MFSA-2013-29 security bulletin released
2013-03-18 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6 OnResize Use-after-free (MS13-021 / CVE-2013-0087)

2013-03-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6
OnResize Use-after-free (MS13-021 / CVE-2013-0087)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error within the MSHTML
CElement::EnsureRecalcNotify() function when processing onResize
events, which could be exploited by remote attackers to compromise
a vulnerable system via a malicious web page.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows 8 for 32-bit Systems
Microsoft Windows 8 for x64-based Systems
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-021 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

https://technet.microsoft.com/en-us/security/bulletin/ms13-021
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-06-29 - Vulnerability Discovered by VUPEN and shared with VUPEN TPP
customers
2013-03-12 - MS13-021 security bulletin released
2013-03-18 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6 OnMove Use-after-free (MS13-021 / CVE-2013-0087)

2013-03-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer 10-9-8-7-6
OnMove Use-after-free (MS13-021 / CVE-2013-0087)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error within the MSHTML
CElement::EnsureRecalcNotify() function when processing onMove
events, which could be exploited by remote attackers to compromise
a vulnerable system via a malicious web page.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows 8 for 32-bit Systems
Microsoft Windows 8 for x64-based Systems
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-021 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

https://technet.microsoft.com/en-us/security/bulletin/ms13-021
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-06-29 - Vulnerability Discovered by VUPEN and shared with VUPEN TPP
customers
2013-03-12 - MS13-021 security bulletin released
2013-03-18 - Public disclosure



VUPEN Security Research - Microsoft Windows OLE Automation Code Execution Vulnerability

2013-02-25 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows OLE Automation Remote Code
Execution Vulnerability

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by an integer overflow error in the
SysAllocStringLen() function within the Oleaut32.dll (Object Linking
and Embedding Automation) library, which could allow remote attackers
to execute arbitrary code via a specially crafted web page or Office
document.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Windows XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS13-020 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of defensive and offensive cybersecurity
intelligence and advanced vulnerability research. VUPEN solutions enable
corporations and governments to manage risks, and protect critical networks
and infrastructures against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms13-020
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-08-05 - Vulnerability Discovered by VUPEN and shared with customers
2013-02-12 - MS13-020 security bulletin released
2013-02-20 - Public disclosure



VUPEN Security Research - Mozilla Firefox imgRequestProxy Remote Use-After-Free Vulnerability

2012-11-30 Thread VUPEN Security Research
VUPEN Security Research - Mozilla Firefox imgRequestProxy Class Remote
Use-After-Free Vulnerability

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Mozilla Firefox is a free and open source web browser and coordinated by
Mozilla Corporation and Mozilla Foundation. As of August 2012, Firefox
has approximately 23% of worldwide usage share of web browsers (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Mozilla Firefox.

The vulnerability is caused by a use-after-free error within the
imgRequestProxy::OnStopRequest() function, which could allow remote
attackers to execute arbitrary code via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Mozilla Firefox versions prior to 17.0
Mozilla Firefox ESR versions prior to 10.0.11
Mozilla Thunderbird versions prior to 17.0
Mozilla Thunderbird ESR versions prior to 10.0.11
Mozilla SeaMonkey versions prior to 2.14


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Firefox 17.0, Firefox ESR 10.0.11, Thunderbird 17.0, Thunderbird
ESR 10.0.11 or SeaMonkey 2.14.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.mozilla.org/security/announce/
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-09-10 - Vulnerability Discovered by VUPEN and shared with customers
2012-11-22 - Public disclosure






VUPEN Security Research - Mozilla Firefox DocumentViewerImpl Class Remote Use-After-Free Vulnerability

2012-11-26 Thread VUPEN Security Research
VUPEN Security Research - Mozilla Firefox DocumentViewerImpl Class
Remote Use-After-Free Vulnerability

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Mozilla Firefox is a free and open source web browser and coordinated by
Mozilla Corporation and Mozilla Foundation. As of August 2012, Firefox
has approximately 23% of worldwide usage share of web browsers (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Mozilla Firefox.

The vulnerability is caused by a use-after-free error within the
DocumentViewerImpl::Show() function, which could allow remote attackers
to execute arbitrary code via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Mozilla Firefox versions prior to 17.0
Mozilla Firefox ESR versions prior to 10.0.11
Mozilla Thunderbird versions prior to 17.0
Mozilla Thunderbird ESR versions prior to 10.0.11
Mozilla SeaMonkey versions prior to 2.14


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Firefox 17.0, Firefox ESR 10.0.11, Thunderbird 17.0, Thunderbird
ESR 10.0.11 or SeaMonkey 2.14.


VII. CREDIT
--

This vulnerability was discovered by Jordan Gruskovnjak of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.mozilla.org/security/announce/
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-06-22 - Vulnerability Discovered by VUPEN and shared with customers
2012-11-22 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer OnMove Use-After-Free Vulnerability (MS12-063)

2012-10-24 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer OnMove
Use-After-Free Vulnerability (MS12-063)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error in the mshtml.dll
component when processing certain onMove events, which could allow
remote attackers execute arbitrary code via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 9
Microsoft Internet Explorer 8

Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS12-063 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms12-063
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-06-15 - Vulnerability Discovered by VUPEN and shared with customers
2012-09-21 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer scrollIntoView Use-After-Free Vulnerability (MS12-063)

2012-10-24 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer scrollIntoView
Use-After-Free Vulnerability (MS12-063)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error in the mshtml.dll
component when processing certain scrollIntoView events, which could
allow
remote attackers execute arbitrary code via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 9
Microsoft Internet Explorer 8

Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS12-063 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms12-063
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-10-10 - Vulnerability Discovered by VUPEN and shared with customers
2012-09-21 - Public disclosure



VUPEN Security Research - Oracle Java Font Processing maxPointCount Heap Overflow Vulnerability

2012-10-24 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java Font Processing maxPointCount
Heap Overflow Vulnerability

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by a heap overflow error within the t2k.dll
component when processing a malformed maxPointCount field within a Font,
which could be exploited by remote attackers to compromise a vulnerable
system via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JRE 7u7 and prior
Oracle Java JDK 7u7 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit or PoC are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Oracle Java 7u9 or later


VII. CREDIT
--

This vulnerability was discovered by Florent Hochwelker of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-09-23 - Vulnerability Discovered by VUPEN
2012-10-16 - Public disclosure



VUPEN Security Research - Oracle Java Font Processing Glyph Element Memory Corruption Vulnerability

2012-10-24 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java Font Processing Glyph Element
Memory Corruption Vulnerability

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by a memory corruption error within the
t2k.dll
component when processing certain glyph elements within a Font file,
which could be exploited by remote attackers to compromise a vulnerable
system via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JRE 7u7 and prior
Oracle Java JDK 7u7 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
remote code execution exploit or PoC are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Oracle Java 7u9 or later


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--
-- 
Chaouki Bekrar - VUPEN
CEO  Head of Research
Email: bek...@vupen.com
Phone: +33 434 883 580
Fax: +33 434 883 581
http://www.vupen.com
http://twitter.com/vupen
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-09-26 - Vulnerability Discovered by VUPEN
2012-10-16 - Public disclosure



VUPEN - Adobe Flash Player Matrix3D Integer Overflow Code Execution (APSB12-19)

2012-09-11 Thread VUPEN Security Research
VUPEN Security Research - Adobe Flash Player Matrix3D Integer Overflow
Code Execution (APSB12-19)

Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Flash Player is a cross-platform browser-based application runtime
that delivers uncompromised viewing of expressive applications, content,
and videos across screens and browsers. It is installed on 98% of computers.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Flash Player.

The vulnerability is caused by an integer overflow error in the
copyRawDataTo() method within the Matrix3D class when processing
malformed arguments, which could allow remote attackers execute arbitrary
code via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Adobe Flash Player version 11.3.300.271 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
exploit including ASLR/DEP bypass are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Flash Player 11.4.402.265


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb12-19.html
http://www.vupen.com


X. DISCLOSURE TIMELINE
-

2012-01-25 - Vulnerability Discovered by VUPEN and shared with customers
2012-08-21 - Public disclosure



VUPEN - Microsoft Windows Common Controls MSCOMCTL.OCX Use-after-free (CVE-2012-1856 / MS12-060)

2012-09-11 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows Common Controls MSCOMCTL.OCX
Use-after-free (CVE-2012-1856 / MS12-060)

Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft products.

The vulnerability is caused by a use-after-free error in the TabStrip
Control within the MSCOMCTL.OCX component, which could allow remote
attackers execute arbitrary code via a specially crafted web page or
malicious Office document.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Office 2010 Service Pack 1
Microsoft Office 2007 Service Pack 3
Microsoft Office 2007 Service Pack 2
Microsoft Office 2003 Web Components Service Pack 3
Microsoft Office 2003 Service Pack 3
Microsoft Office XP Service Pack 3
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2008
Microsoft SQL Server 2005
Microsoft SQL Server 2000
Microsoft Commerce Server 2009 R2
Microsoft Commerce Server 2009
Microsoft Commerce Server 2007 Service Pack 2
Microsoft Commerce Server 2002 Service Pack 4
Microsoft Host Integration Server 2004 Service Pack 1
Microsoft Visual FoxPro 8.0 Service Pack 1
Microsoft Visual FoxPro 9.0 Service Pack 2
Microsoft Visual Basic 6.0 Runtime


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
exploit including ASLR/DEP bypass are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS12-060 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms12-060
http://www.vupen.com


X. DISCLOSURE TIMELINE
-

2010-09-06 - Vulnerability Discovered by VUPEN and shared with customers
2012-08-14 - Public disclosure



VUPEN - Mozilla Firefox nsHTMLEditRules Remote Use-after-free (CVE-2012-3958 / MFSA 2012-58)

2012-09-11 Thread VUPEN Security Research
VUPEN Security Research - Mozilla Firefox nsHTMLEditRules Remote
Use-after-free (CVE-2012-3958 / MFSA 2012-58)

Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Mozilla Firefox is a free and open source web browser and coordinated by
Mozilla Corporation and Mozilla Foundation. As of August 2012, Firefox
has approximately 23% of worldwide usage share of web browsers (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Mozilla Firefox.

The vulnerability is caused by a use-after-free error in the
setUserData()
method within the nsHTMLEditRules class, which could allow remote
attackers execute arbitrary code via a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Mozilla Firefox versions prior to 15
Mozilla Firefox ESR versions prior to 10.0.7
Mozilla Thunderbird versions prior to 15
Mozilla Thunderbird ESR versions prior to 10.0.7
Mozilla SeaMonkey versions prior to 2.12


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a fully functional
exploit including DEP bypass are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Firefox 15, Firefox ESR 10.0.7, Thunderbird 15, Thunderbird ESR
10.0.7, and SeaMonkey 2.12.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leading provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
http://www.vupen.com


X. DISCLOSURE TIMELINE
-

2012-07-15 - Vulnerability Discovered by VUPEN and shared with customers
2012-08-28 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer CollectionCache Remote Use-after-free (MS12-037)

2012-06-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer CollectionCache 
Remote Use-after-free (MS12-037)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error in the mshtml.dll
module when processing CollectionCache objects, which could allow remote
attackers to leak memory and execute arbitrary code despite ASLR and DEP.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 8
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a functional exploit
including ASLR and DEP bypass are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS12-037 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms12-037
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-06-15 - Vulnerability Discovered by VUPEN and shared with customers
2012-06-12 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer GetAtomTable Remote Use-after-free (MS12-037 / CVE-2012-1875)

2012-06-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer GetAtomTable 
Remote Use-after-free (MS12-037 / CVE-2012-1875)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error in the mshtml.dll
module when processing GetAtomTable objects, which could allow remote
attackers to leak memory and execute arbitrary code despite ASLR and DEP.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 8
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1



IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a functional exploit
including ASLR and DEP bypass are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS12-037 security update.


VII. CREDIT
--

This vulnerability was discovered by Jordan Gruskovnjak of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms12-037
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-04-03 - Vulnerability Discovered by VUPEN and shared with customers
2012-06-12 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer Col Element Remote Heap Overflow (MS12-037 / CVE-2012-1876)

2012-06-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer Col Element 
Remote Heap Overflow (MS12-037 / CVE-2012-1876)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a heap overflow error in the mshtml.dll
module when processing Col elements, which could allow remote attackers
to leak memory and execute arbitrary code despite ASLR and DEP.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows 8 for 32-bit Systems
Microsoft Windows 8 for x64-based Systems
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a functional exploit
including ASLR and DEP bypass are available through the VUPEN BAE
(Binary Analysis  Exploits) portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS12-037 security update.


VII. CREDIT
--

This vulnerability was discovered by Alexandre Pelletier of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms12-037
http://www.vupen.com/english/research.php

VUPEN Security Research - Adobe Flash Player NetStream Remote Code Execution Vulnerability (APSB12-07 / CVE-2012-0773)

2012-04-19 Thread VUPEN Security Research
VUPEN Security Research - Adobe Flash Player NetStream Remote Code 
Execution Vulnerability (APSB12-07 / CVE-2012-0773)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Flash Player is a cross-platform browser-based application runtime
that delivers uncompromised viewing of expressive applications, content,
and videos across screens and browsers. It is installed on 98% of 
computers.



II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Flash Player.

The vulnerability is caused by an invalid object being used when parsing
a malformed video via NetStream.appendBytes, which could allow remote
attackers to leak memory and execute arbitrary code despite ASLR and DEP 
enabled.


CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Adobe Flash Player versions prior to 11.2.202.228


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a working exploit
are available through the VUPEN Binary Analysis  Exploits portal:

http://www.vupen.com/english/services/ba-index.php

VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. SOLUTION


Upgrade to Adobe Flash Player version 11.2.202.228.


VI. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VII. ABOUT VUPEN Security
---

VUPEN is the leadering provider of advanced vulnerability research for
defensive and offensive cyber security. VUPEN solutions enable corporations
and governments to measure and manage risks, eliminate vulnerabilities
before they can be exploited, and protect critical infrastructures and
assets against known and unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


VIII. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb12-07.html
http://www.vupen.com/english/research.php


IX. DISCLOSURE TIMELINE
-

2012-03-07 - Vulnerability Demonstrated at Pwn20wn
2012-04-18 - Public disclosure



VUPEN Security Research - Microsoft Internet Explorer VML Remote Code Execution (MS12-023 / CVE-2012-0172)

2012-04-18 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer VML Remote Code 
Execution (MS12-023 / CVE-2012-0172)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error within the
vgx.dll component when processing certain VML behaviors, which could
be exploited by attackers to compromise a vulnerable system by tricking
a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a working exploit
are available through the VUPEN Binary Analysis  Exploits portal:

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the Microsoft MS12-023 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known 
and

unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms12-023
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-02-28 - Vulnerability Discovered by VUPEN and shared with TPP customers
2012-04-10 - Public disclosure




VUPEN Security Research - Adobe Flash Player Matrix3D Remote Memory Corruption (CVE-2012-0768)

2012-03-19 Thread VUPEN Security Research
VUPEN Security Research - Adobe Flash Player Matrix3D Remote Memory 
Corruption (APSB12-05 / CVE-2012-0768)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Flash Player is a cross-platform browser-based application runtime
that delivers uncompromised viewing of expressive applications, content,
and videos across screens and browsers. Flash Player delivers 
breakthrough web experiences to over 98% of Internet users.



II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a memory corruption error within the
Matrix3D class when processing malformed 3D data within SWF files, which
could be exploited by attackers to potentially compromise a vulnerable
system or disclose memory information by tricking a user into visiting
a specially crafted web page.


III. AFFECTED PRODUCTS
---

Adobe Flash Player version 11.1.102.62 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a proof-of-concept
code are available through the VUPEN Binary Analysis  Exploits portal:

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Flash Player version 11.1.102.63.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known 
and

unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb12-05.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2012-01-27 - Vulnerability Discovered by VUPEN
2012-03-15 - Public disclosure




VUPEN Security Research - Adobe Acrobat and Reader Image Processing Integer Overflow (APSB12-01)

2012-01-11 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat and Reader Image Processing Integer 
Overflow Vulnerability (APSB12-01)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by an integer overflow error when processing
malformed image data within a PDF document, which could be exploited by
attackers to compromise a vulnerable system by tricking a user
into opening a specially crafted PDF file.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader X (10.1.1) and prior
Adobe Acrobat and Reader 9.4.7 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth technical analysis of the vulnerability and a proof-of-concept
code are available through the VUPEN Binary Analysis  Exploits portal:

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Acrobat and Reader X version 10.1.2 or Adobe Acrobat and
Reader version 9.5.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb12-01.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-12 - Vulnerability Discovered by VUPEN and shared with Gov customers
2012-01-11 - Public disclosure




VUPEN Security Research - Microsoft Windows Time Behaviour Remote Use-after-free Vulnerability (MS11-090)

2011-12-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows Time Behaviour Remote 
Use-after-free Vulnerability (MS11-090)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft
Windows.

The vulnerability is caused by a use-after-free error in the mshtml.dll
module when handling a specific Time behavior, which could be exploited by
remote attackers to compromise a vulnerable system via a specially crafted
web page.


III. AFFECTED PRODUCTS
---

Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-090 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms11-090
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-11-23 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-12-16 - Public disclosure




VUPEN Security Research - Microsoft Windows Media Player DVR-MS Buffer Overflow Vulnerability (MS11-092)

2011-12-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows Media Player DVR-MS Buffer 
Overflow Vulnerability (MS11-092)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows Media Player (WMP) is a media player and media library
application that is used for playing audio, video and viewing images on
personal computers running the Microsoft Windows operating system.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft
Windows Media Player.

The vulnerability is caused by a buffer overflow error in the XDSCodec 
Encypter/Decrypter Tagger Filters ENCDEC.DLL within Windows Media Player
when processing certain fields within a DVR-MS (Digital Video Recording)
file, which could be exploited by remote attackers to compromise a 
vulnerable

system via a specially crafted web page or a malicious .dvr-ms media file.


III. AFFECTED PRODUCTS
---

Microsoft Windows XP Media Center Edition 2005 Service Pack 3
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows 7 (32-bit)
Microsoft Windows 7 (32-bit) Service Pack 1
Microsoft Windows 7 (x64)
Microsoft Windows 7 (x64) Service Pack 1


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-092 security update.


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms11-092
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-05-03 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-12-16 - Public disclosure




VUPEN Security Research - Adobe Flash Player SAlign Memory Corruption Vulnerability (CVE-2011-2459)

2011-12-19 Thread VUPEN Security Research
VUPEN Security Research - Adobe Flash Player SAlign Memory Corruption 
Vulnerability (CVE-2011-2459)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Flash Player is a cross-platform browser-based application runtime
that delivers uncompromised viewing of expressive applications, content,
and videos across screens and browsers. Flash Player delivers breakthrough
web experiences to over 98% of Internet users.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a vulnerability in Adobe
Flash Player.

The vulnerability is caused by an uninitialized stack variable when
processing an invalid SAlign property of the Flash ActiveX control,
which could be exploited by remote attackers to compromise a vulnerable
system via a specially crafted web page.


III. AFFECTED PRODUCTS
---

Adobe Flash Player versions prior to 11.1.102.55


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Flash Player version 11.1.102.55


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-28.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-01-27 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-12-16 - Public disclosure




VUPEN Security Research - Microsoft Windows datime.dll Remote Code Execution Vulnerability (MS11-090)

2011-12-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows datime.dll Remote Code 
Execution Vulnerability (MS11-090)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft
Windows.

The vulnerability is caused by a use-after-free error in the TIME 
(datime.dll)

module when loaded via a specific behavior, which could be exploited by
remote attackers to compromise a vulnerable system via a specially crafted
web page.


III. AFFECTED PRODUCTS
---

Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-090 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recognized as Company of the Year 2011 in the Vulnerability
Research Market by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms11-090
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-07-12 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-12-16 - Public disclosure




VUPEN Security Research - Microsoft Internet Explorer X-UA-COMPATIBLE Use-after-free Vulnerability

2011-10-21 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer X-UA-COMPATIBLE 
Use-after-free Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft
Internet Explorer.

The vulnerability is caused by a use-after-free error in the mshtml.dll
component when processing the X-UA-COMPATIBLE keyword of a META tag,
which could be exploited by remote attackers to compromise a vulnerable
system via a specially crafted web page.


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-081 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/MS11-081
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-03-09 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-10-12 - Public disclosure




VUPEN Security Research - Google Chrome WebKit Engine Ruby Tag Stale Pointer Vulnerability

2011-10-07 Thread VUPEN Security Research
VUPEN Security Research - Google Chrome WebKit Engine Ruby Tag Stale Pointer 
Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Google Chrome is a web browser developed by Google that uses the WebKit
layout engine. As of August 2011, Chrome is the third most widely used
browser with 23.16% worldwide usage share of web browsers (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a vulnerability in Google 
Chrome.


The vulnerability is caused by a stale pointer in the WebKit engine when
deleting a Ruby tag and its children in a specific order, which could be
exploited by remote attackers to compromise a vulnerable system via a
specially crafted web page.


III. AFFECTED PRODUCTS
---

Google Chrome versions prior to 14.0.835.202


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Google Chrome version 14.0.835.202


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-09-20 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-10-05 - Public disclosure




VUPEN Security Research - Google Chrome WebKit Engine Child Tag Deletion Stale Pointer Vulnerability

2011-10-07 Thread VUPEN Security Research
VUPEN Security Research - Google Chrome WebKit Engine Child Tag Deletion 
Stale Pointer Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Google Chrome is a web browser developed by Google that uses the WebKit
layout engine. As of August 2011, Chrome is the third most widely used
browser with 23.16% worldwide usage share of web browsers (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a vulnerability in Google 
Chrome.


The vulnerability is caused by a stale pointer in the WebKit engine when
deleting certain child tags in a specific order, which could be exploited by
remote attackers to compromise a vulnerable system via a specially crafted
web page.


III. AFFECTED PRODUCTS
---

Google Chrome versions prior to 14.0.835.202


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Google Chrome version 14.0.835.202


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-06-06 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-10-05 - Public disclosure




VUPEN Security Research - Novell GroupWise TZNAME Remote Buffer Overflow Vulnerability

2011-09-28 Thread VUPEN Security Research

VUPEN Security Research - Novell GroupWise Calendar TZNAME Remote Buffer
Overflow Vulnerability

Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Novell GroupWise is a messaging and collaborative software platform that
supports email, calendaring, personal information management, instant
messaging, and document management. (Wikipedia)

II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Novell GroupWise.

The vulnerability is caused by a buffer overflow error in the
NgwiCalVTimeZoneBody::ParseSelf()
function within the G1.dll component when processing an overly long
TZNAME variable in a Calendar, which could be exploited by remote
unauthenticated attackers to compromise a vulnerable server via a specially
crafted email message.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Novell GroupWise v8.0.2 (SP2) Hot Patch 2 (HP2) and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Novell GroupWise v8.0.2 (SP2) Hot Patch 3 (HP3)


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and
governments
to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the
Vulnerability
Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://download.novell.com/Download?buildid=gBjwGIdt77s~
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-11-22 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-27 - Public disclosure




VUPEN Security Research - Novell GroupWise BYWEEKNO Remote Memory Corruption Vulnerability

2011-09-28 Thread VUPEN Security Research
VUPEN Security Research - Novell GroupWise Calendar BYWEEKNO Remote Memory 
Corruption Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Novell GroupWise is a messaging and collaborative software platform that
supports email, calendaring, personal information management, instant
messaging, and document management. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Novell GroupWise.

The vulnerability is caused by a buffer overflow error in the 
ICalProcessYearlyRule()

function within the g1.dll component when processing a malformed
BYWEEKNO property in a Calendar, which could be exploited by remote
unauthenticated attackers to compromise a vulnerable server via a specially
crafted email message.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Novell GroupWise v8.0.2 (SP2) Hot Patch 2 (HP2) and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Novell GroupWise v8.0.2 (SP2) Hot Patch 3 (HP3)


VII. CREDIT
--

This vulnerability was discovered by Alexandre Pelletier of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://download.novell.com/Download?buildid=gBjwGIdt77s~
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-02-02 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-27 - Public disclosure




VUPEN Security Research - Novell GroupWise integerList Remote Buffer Overflow Vulnerability

2011-09-28 Thread VUPEN Security Research

VUPEN Security Research - Novell GroupWise Calendar integerList Remote
Buffer Overflow Vulnerability

Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Novell GroupWise is a messaging and collaborative software platform that
supports email, calendaring, personal information management, instant
messaging, and document management. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Novell GroupWise.

The vulnerability is caused by a buffer overflow error in the
NgwIRecurParam::integerList()
function within the g1.dll component when processing a malformed
RRULE integer list in a Calendar, which could be exploited by remote
unauthenticated attackers to compromise a vulnerable server via a specially
crafted email message.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Novell GroupWise v8.0.2 (SP2) Hot Patch 2 (HP2) and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the
vulnerability
when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Novell GroupWise v8.0.2 (SP2) Hot Patch 3 (HP3)


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and
governments
to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the
Vulnerability
Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://download.novell.com/Download?buildid=gBjwGIdt77s~
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-11-17 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-27 - Public disclosure




VUPEN Security Research - Novell GroupWise RRULE Remote Buffer Overflow Vulnerability

2011-09-28 Thread VUPEN Security Research
VUPEN Security Research - Novell GroupWise Calendar RRULE Remote Buffer 
Overflow Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Novell GroupWise is a messaging and collaborative software platform that
supports email, calendaring, personal information management, instant
messaging, and document management. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Novell GroupWise.

The vulnerability is caused by a buffer overflow error in the 
NgwIRecurByWeekdayParam::bywdaylist()

function within the g1.dll component when processing a malformed
RRULE property in a Calendar, which could be exploited by remote
unauthenticated attackers to compromise a vulnerable server via a specially
crafted email message.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Novell GroupWise v8.0.2 (SP2) Hot Patch 2 (HP2) and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits portal :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Novell GroupWise v8.0.2 (SP2) Hot Patch 3 (HP3)


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://download.novell.com/Download?buildid=gBjwGIdt77s~
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-11-16 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-27 - Public disclosure




VUPEN Security Research - Microsoft Office Excel Formula Record Heap Corruption Vulnerability

2011-09-19 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Excel Formula Record Heap 
Corruption Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Office Excel is a powerful tool you can use to create and format
spreadsheets, and analyze and share information to make more informed
decisions. With the Microsoft Office Fluent user interface, rich data
visualization, and PivotTable views, professional-looking charts are easier
to create and use. (microsoft.com)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Excel.

The vulnerability is caused by a heap corruption error when processing
malformed Formula records within an Excel document, which could be exploited
by attackers to compromise a vulnerable system by tricking a user into
opening a specially crafted XLS document.


III. AFFECTED PRODUCTS
---

Microsoft Office 2010
Microsoft Office 2007 Service Pack 2
Microsoft Office 2003 Service Pack 3
Microsoft Office 2002 Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS11-072 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://technet.microsoft.com/en-us/security/bulletin/ms11-072
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-06-25 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-14 - Public disclosure




VUPEN Security Research - Adobe Acrobat and Reader TIFF BitsPerSample Heap Overflow Vulnerability

2011-09-14 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat and Reader TIFF BitsPerSample Heap 
Overflow Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a heap overflow error when processing a
malformed BitsPerSample field of a TIFF image, which could be exploited
by attackers to compromise a vulnerable system by tricking a user
into opening a specially crafted PDF document.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader X (10.1) and prior
Adobe Acrobat and Reader 9.4.5 and prior
Adobe Acrobat and Reader 8.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Acrobat and Reader X (10.1.1), Adobe Acrobat and Reader 
v9.4.6

or Adobe Acrobat and Reader v8.3.1.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-24.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-20 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-14 - Public disclosure




VUPEN Security Research - Adobe Acrobat and Reader Picture Dimensions Heap Overflow Vulnerability

2011-09-14 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat and Reader Picture Dimensions Heap 
Overflow Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a heap overflow error when processing a
picture file with malformed dimensions, which could be exploited by
attackers to compromise a vulnerable system by tricking a user
into opening a specially crafted PDF document.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader X (10.1) and prior
Adobe Acrobat and Reader 9.4.5 and prior
Adobe Acrobat and Reader 8.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Acrobat and Reader X (10.1.1), Adobe Acrobat and Reader 
v9.4.6

or Adobe Acrobat and Reader v8.3.1.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-24.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-20 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-14 - Public disclosure




VUPEN Security Research - Adobe Acrobat and Reader IFF Processing Heap Overflow Vulnerability

2011-09-14 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat and Reader IFF Processing Heap 
Overflow Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a heap overflow error when processing
malformed IFF data within a PDF document, which could be exploited by
attackers to compromise a vulnerable system by tricking a user
into opening a specially crafted PDF file.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader X (10.1) and prior
Adobe Acrobat and Reader 9.4.5 and prior
Adobe Acrobat and Reader 8.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Acrobat and Reader X (10.1.1), Adobe Acrobat and Reader 
v9.4.6

or Adobe Acrobat and Reader v8.3.1.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-24.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-09 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-14 - Public disclosure




VUPEN Security Research - Adobe Acrobat and Reader PCX Processing Heap Overflow Vulnerability

2011-09-14 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat and Reader PCX Processing Heap 
Overflow Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a heap overflow error when processing
malformed PCX data within a PDF document, which could be exploited by
attackers to compromise a vulnerable system by tricking a user
into opening a specially crafted PDF file.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader X (10.1) and prior
Adobe Acrobat and Reader 9.4.5 and prior
Adobe Acrobat and Reader 8.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Acrobat and Reader X (10.1.1), Adobe Acrobat and Reader 
v9.4.6

or Adobe Acrobat and Reader v8.3.1.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-24.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-20 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-14 - Public disclosure




VUPEN Security Research - Adobe Acrobat and Reader BMP Dimensions Heap Overflow Vulnerability

2011-09-14 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat and Reader BMP Dimensions Heap 
Overflow Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a heap overflow error when processing
malformed BMP data within a PDF document, which could be exploited by
attackers to compromise a vulnerable system by tricking a user
into opening a specially crafted PDF file.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader X (10.1) and prior
Adobe Acrobat and Reader 9.4.5 and prior
Adobe Acrobat and Reader 8.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Acrobat and Reader X (10.1.1), Adobe Acrobat and Reader 
v9.4.6

or Adobe Acrobat and Reader v8.3.1.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-24.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-12 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-14 - Public disclosure




VUPEN Security Research - Adobe Acrobat and Reader Picture Processing Stack Overflow Vulnerability

2011-09-14 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat and Reader Picture Processing Stack 
Overflow Vulnerability


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Acrobat and Reader.

The vulnerability is caused by a stack overflow error when processing a
malformed picture within a PDF document, which could be exploited by
attackers to compromise a vulnerable system by tricking a user
into opening a specially crafted PDF file.


III. AFFECTED PRODUCTS
---

Adobe Acrobat and Reader X (10.1) and prior
Adobe Acrobat and Reader 9.4.5 and prior
Adobe Acrobat and Reader 8.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

Governments and major corporations which are members of the VUPEN Threat
Protection Program (TPP) have been proactively alerted about the 
vulnerability

when it was discovered by VUPEN in advance of its public disclosure, and
have received a detailed attack detection guidance to protect national and
critical infrastructures against potential 0-day attacks exploiting this
vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Acrobat and Reader X (10.1.1), Adobe Acrobat and Reader 
v9.4.6

or Adobe Acrobat and Reader v8.3.1.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive cyber security. VUPEN solutions enable corporations and 
governments

to measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against known and
unknown vulnerabilities.

VUPEN has been recently recognized as Company of the Year in the 
Vulnerability

Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-24.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-20 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-09-14 - Public disclosure




VUPEN Security Research - Adobe Shockwave rcsL Record Array Indexing Vulnerability (APSB11-19)

2011-08-15 Thread VUPEN Security Research

VUPEN Security Research - Adobe Shockwave rcsL Record Array Indexing
Vulnerability (APSB11-19)

Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Over 450 million Internet-enabled desktops have installed Adobe Shockwave
Player. These people now have access to some of the best the Web has to
offer
including dazzling 3D games and entertainment, interactive product
demonstrations, and online learning applications. Shockwave Player displays
Web content that has been created by Adobe Director. from Adobe.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Shockwave.

The vulnerability is caused by an array indexing error in the dirapi.dll
component when processing malformed data within the rcsL record, which
could be exploited by remote attackers to compromise a vulnerable system
by tricking a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Adobe Shockwave Player v11.6.0.626 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code
audit.

The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares
its
vulnerability research with governments and organizations members of the
VUPEN
Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about
security
vulnerabilities discovered by VUPEN and in advance of their public
disclosure.

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Shockwave Player v11.6.1.629.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-19.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-07-05 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-08-10 - Public disclosure




VUPEN Security Research - Adobe Flash Player ActionScript FileReference Buffer Overflow (APSB11-21)

2011-08-15 Thread VUPEN Security Research
VUPEN Security Research - Adobe Flash Player ActionScript FileReference 
Buffer Overflow (APSB11-21)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Adobe Flash Player is a cross-platform browser-based application runtime
that delivers uncompromised viewing of expressive applications, content,
and videos across screens and browsers. Flash Player delivers breakthrough
web experiences to over 98% of Internet users. from Adobe.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Flash Player.

The vulnerability is caused by a buffer overflow error when processing a
malformed ActionScript FileReference method, which could be exploited by
remote attackers to compromise a vulnerable system by tricking a user
into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE: CVE-2011-2137


III. AFFECTED PRODUCTS
---

Adobe Flash Player v10.3.181.34 and prior
Adobe Flash Player v10.3.185.25 and prior for Android
Adobe AIR version 2.7 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Flash Player v10.3.183.5 :
http://www.adobe.com/go/getflash

Upgrade to Adobe Flash Player v10.3.186.3 for Android :
market://details?id=com.adobe.flashplayer

Upgrade to Adobe AIR v2.7.1 :
http://get.adobe.com/air


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.adobe.com/support/security/bulletins/apsb11-21.html
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2011-04-28 - Vulnerability Discovered by VUPEN and shared with customers
2011-08-10 - Public disclosure




VUPEN Security Research - Microsoft Windows OLE Automation Integer Underflow Vulnerability (MS11-038)

2011-06-18 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows OLE Automation Integer Underflow 
Vulnerability (MS11-038)


Website : http://www.vupen.com/english/research.php

Twitter : http://twitter.com/vupen


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by an integer underflow error in the Object
Linking and Embedding (OLE) Automation component when processing malformed
Windows Metafile (WMF) data via the _PictLoadMetaFileRaw() function,
which could be exploited by remote attackers to compromise a vulnerable
system by tricking a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE: CVE-2011-0658


III. AFFECTED PRODUCTS
---

Microsoft Windows 7 (32-bit)
Microsoft Windows 7 (x64)
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2008 (32-bit)
Microsoft Windows Server 2008 (32-bit) Service Pack 2
Microsoft Windows Server 2008 (Itanium)
Microsoft Windows Server 2008 (Itanium) Service Pack 2
Microsoft Windows Server 2008 (x64)
Microsoft Windows Server 2008 (x64) Service Pack 2
Microsoft Windows Server 2008 R2 (Itanium)
Microsoft Windows Server 2008 R2 (x64)
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS11-038 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.microsoft.com/technet/security/Bulletin/MS11-038.mspx
http://www.vupen.com/english/research.php


X. DISCLOSURE TIMELINE
-

2010-08-05 - Vulnerability Discovered by VUPEN and shared with TPP customers
2011-06-14 - Public disclosure




VUPEN Security Research - Oracle Java ICC Profile clrt Tag Integer Overflow Code Execution Vulnerability

2011-06-10 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java ICC Profile clrt Tag Integer 
Overflow Code Execution Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.

Java runs on more than 850 million personal computers worldwide, and
on billions of devices worldwide, including mobile and TV devices.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by an integer overflow error in the Color
Management Module (CMM) when processing a malformed clrt tag within
an ICC profile, which could be exploited by attackers to execute arbitrary
code by tricking a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JDK and JRE 6 Update 25 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Oracle Java JDK and JRE 6 Update 26.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and Governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html


X. DISCLOSURE TIMELINE
-

2011-01-07 - Vulnerability Discovered by VUPEN
2011-06-09 - Public disclosure




VUPEN Security Research - Oracle Java ICC Profile bfd Tag Integer Overflow Code Execution Vulnerability

2011-06-10 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java ICC Profile bfd Tag Integer Overflow 
Code Execution Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.

Java runs on more than 850 million personal computers worldwide, and
on billions of devices worldwide, including mobile and TV devices.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by an integer truncation error in the
Color Management Module (CMM) when processing a malformed bfd tag
within an ICC profile, which could be exploited by attackers to
execute arbitrary code by tricking a user into visiting a specially
crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JDK and JRE 6 Update 25 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Oracle Java JDK and JRE 6 Update 26.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and Governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html


X. DISCLOSURE TIMELINE
-

2010-12-21 - Vulnerability Discovered by VUPEN
2011-06-09 - Public disclosure




VUPEN Security Research - Oracle Java ICC Profile ncl2 Tag Integer Overflow Code Execution Vulnerability

2011-06-10 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java ICC Profile ncl2 Tag Integer 
Overflow Code Execution Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.

Java runs on more than 850 million personal computers worldwide, and
on billions of devices worldwide, including mobile and TV devices.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by an integer overflow error in the Color
Management Module (CMM) when processing a malformed ncl2 tag within
an ICC profile, which could be exploited by attackers to execute arbitrary
code by tricking a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JDK and JRE 6 Update 25 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Oracle Java JDK and JRE 6 Update 26.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and Governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html


X. DISCLOSURE TIMELINE
-

2010-12-21 - Vulnerability Discovered by VUPEN
2011-06-09 - Public disclosure




VUPEN Security Research - Oracle Java ICC Profile pseq Tag Integer Overflow Code Execution Vulnerability

2011-06-10 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java ICC Profile pseq Tag Integer 
Overflow Code Execution Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.

Java runs on more than 850 million personal computers worldwide, and
on billions of devices worldwide, including mobile and TV devices.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by an integer overflow error in the Color
Management Module (CMM) when processing a malformed pseq tag within
an ICC profile, which could be exploited by attackers to execute arbitrary
code by tricking a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JDK and JRE 6 Update 25 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Oracle Java JDK and JRE 6 Update 26.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and Governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html


X. DISCLOSURE TIMELINE
-

2010-12-21 - Vulnerability Discovered by VUPEN
2011-06-09 - Public disclosure




VUPEN Security Research - Oracle Java ICC Profile scrn Tag Integer Overflow Code Execution Vulnerability

2011-06-10 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java ICC Profile scrn Tag Integer 
Overflow Code Execution Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.

Java runs on more than 850 million personal computers worldwide, and
on billions of devices worldwide, including mobile and TV devices.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by an integer overflow error in the Color
Management Module (CMM) when processing a malformed scrn tag within
an ICC profile, which could be exploited by attackers to execute arbitrary
code by tricking a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JDK and JRE 6 Update 25 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Oracle Java JDK and JRE 6 Update 26.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and Governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html


X. DISCLOSURE TIMELINE
-

2010-12-14 - Vulnerability Discovered by VUPEN
2011-06-09 - Public disclosure




VUPEN Security Research - Oracle Java ICC Profile mluc Tag Integer Overflow Code Execution Vulnerability

2011-06-10 Thread VUPEN Security Research
VUPEN Security Research - Oracle Java ICC Profile mluc Tag Integer 
Overflow Code Execution Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Java is a programming language and computing platform released by Sun
Microsystems (now Oracle). It is the underlying technology that powers
state-of-the-art programs including utilities, games, and business
applications.

Java runs on more than 850 million personal computers worldwide, and
on billions of devices worldwide, including mobile and TV devices.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Oracle Java.

The vulnerability is caused by an integer overflow error in the Color
Management Module (CMM) when processing a malformed mluc tag within
an ICC profile, which could be exploited by attackers to execute arbitrary
code by tricking a user into visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Oracle Java JDK and JRE 6 Update 25 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Oracle Java JDK and JRE 6 Update 26.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and Governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

VUPEN has been recently recognized as Entrepreneurial Company of the Year
in the Vulnerability Research Market (2011) by Frost  Sullivan.

VUPEN solutions include:

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html


X. DISCLOSURE TIMELINE
-

2011-01-07 - Vulnerability Discovered by VUPEN
2011-06-09 - Public disclosure




VUPEN Security Research - 7T Interactive Graphical SCADA System (IGSS) Remote Memory Corruption

2011-05-24 Thread VUPEN Security Research
VUPEN Security Research - 7T Interactive Graphical SCADA System ODBC Remote 
Memory Corruption


http://www.vupen.com/english/research.php


I. BACKGROUND
-

7T Interactive Graphical SCADA System (IGSS) is a state-of-the art
SCADA system used for monitoring and controlling industrial processes.

IGSS has been installed in more than 28.000 industrial plants worldwide.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in 7T Interactive Graphical SCADA System (IGSS).

The vulnerability is caused by a memory corruption error in the Open
Database Connectivity (ODBC) component when processing packets sent
to port 20222/TCP, which could result in an invalid structure being
used, leading to an exploitable condition.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

7T Interactive Graphical SCADA System (IGSS) versions prior to 9.0.0.11143


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


VUPEN Binary Analysis  Exploits Service provides private exploits and
in-depth technical analysis of the most significant public vulnerabilities
based on disassembly, reverse engineering, protocol analysis, and code 
audit.


The service allows governments and major corporations to evaluate risks, and
protect infrastructures and assets against new threats. The service also
allows security vendors (IPS, IDS, AntiVirus) to supplement their internal
research efforts and quickly develop both vulnerability-based and
exploit-based signatures to proactively protect their customers from attacks
and emerging threats.


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to version 9.0.0.11143.


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is the world leader in vulnerability research for defensive and
offensive security. VUPEN solutions enable corporations and Governments to
measure and manage risks, eliminate vulnerabilities before they can be
exploited, and protect critical infrastructures and assets against
known and unknown vulnerabilities.

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/1301


X. DISCLOSURE TIMELINE
-

2011-05-15 - Vulnerability Discovered by VUPEN
2011-05-18 - Vendor informed
2011-05-18 - Vendor reply
2011-05-24 - Coordinated disclosure




VUPEN Security Research - Microsoft Internet Explorer Property Change Memory Corruption (CVE-2011-1345)

2011-04-15 Thread VUPEN Security Research

VUPEN Security Research - Microsoft Internet Explorer Property Change Memory
Corruption (CVE-2011-1345)

http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free error in the
CObjectElement::OnPropertyChange() function within the MSHTML library
when handling objects, which could be exploited by remote attackers to
compromise a vulnerable system by tricking a user into visiting a specially
crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Windows 7 for 32-bit Systems
Microsoft Windows 7 for 32-bit Systems Service Pack 1
Microsoft Windows 7 for x64-based Systems
Microsoft Windows 7 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for Itanium-based Systems
Microsoft Windows Server 2008 R2 for Itanium-based Systems Service Pack 1



IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-018 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0937
http://www.microsoft.com/technet/security/bulletin/MS11-018.mspx


X. DISCLOSURE TIMELINE
-

2011-01-22 - Vulnerability Discovered by VUPEN
2011-04-12 - MS11-018 security update available




VUPEN Security Research - Apple Safari Text Nodes Remote Use-after-free Vulnerability (CVE-2011-1344)

2011-04-15 Thread VUPEN Security Research
VUPEN Security Research - Apple Safari Text Nodes Remote Use-after-free 
Vulnerability (CVE-2011-1344)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Apple Safari is a web browser developed by Apple. As of February 2010,
Safari was the fourth most widely used browser, with 4.45% of the
worldwide usage share of web browsers according to Net Application.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Apple Safari.

The vulnerability is caused by a use-after-free error in the WebKit
library when processing certain text nodes, which could be exploited by
remote attackers to execute arbitrary code by tricking a user into
visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Apple Safari version 5.0.4 and prior for Windows and Mac OS X
Apple iOS versions 3.0 through 4.3.1 for iPhone 3GS and later
Apple iOS versions 3.1 through 4.3.1 for iPod touch (3rd generation) and 
later

Apple iOS versions 3.2 through 4.3.1 for iPad
Apple iOS versions 4.2.5 through 4.2.6 for iPhone 4 (CDMA)


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Apple Safari version 5.0.5 for Windows and Mac OS X.

Upgrade to Apple iOS version 4.3.2 for iPhone, iPod, and iPad.

Upgrade to Apple iOS version 4.2.7 for iPhone 4 (CDMA).


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0984
http://www.vupen.com/english/advisories/2011/0983
http://support.apple.com/kb/HT4596
http://support.apple.com/kb/HT4606
http://support.apple.com/kb/HT4607


X. DISCLOSURE TIMELINE
-

2011-02-26 - Vulnerability Discovered by VUPEN
2011-04-14 - Apple updates available




VUPEN Security Research - Microsoft Windows OpenType CFF Driver Stack Overflow Vulnerability (CVE-2011-0034)

2011-04-15 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows OpenType CFF Driver Stack 
Overflow Vulnerability (CVE-2011-0034)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by a stack overflow error in the OpenType
Compact Font Format (CFF) driver ATMFD.dll when processing certain
operands within an OpenType font, which could be exploited by remote
attackers to execute arbitrary code on a vulnerable Windows 7, Windows
Server 2008, Windows Server 2008 R2, and Windows Vista systems via a
malicious font, or by local attackers to gain elevated privileges on
Windows XP and Windows Server 2003 systems via a malicious application.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 (32-bit)
Microsoft Windows Server 2008 (32-bit) Service Pack 2
Microsoft Windows Server 2008 (64x)
Microsoft Windows Server 2008 (64x) Service Pack 2
Microsoft Windows Server 2008 (Itanium)
Microsoft Windows Server 2008 (Itanium) Service Pack 2
Microsoft Windows 7 (32-bit)
Microsoft Windows 7 (32-bit) Service Pack 1
Microsoft Windows 7 (64x)
Microsoft Windows 7 (64x) Service Pack 1
Microsoft Windows Server 2008 R2 (64x)
Microsoft Windows Server 2008 R2 (64x) Service Pack 1
Microsoft Windows Server 2008 R2 (Itanium)
Microsoft Windows Server 2008 R2 (Itanium) Service Pack 1


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-032 security update.


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0950
http://www.microsoft.com/technet/security/Bulletin/MS11-032.mspx


X. DISCLOSURE TIMELINE
-

2011-03-02 - Vulnerability Discovered by VUPEN
2011-04-12 - MS11-032 security update available




VUPEN Security Research - Microsoft Office Excel Real Time Data Stack Overwrite Vulnerability (CVE-2011-0105)

2011-04-15 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Excel Real Time Data Stack 
Overwrite Vulnerability (CVE-2011-0105)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Office Excel is a powerful tool you can use to create and format
spreadsheets, and analyze and share information to make more informed
decisions. With the Microsoft Office Fluent user interface, rich data
visualization, and PivotTable views, professional-looking charts are easier
to create and use. (microsoft.com)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Excel.

The vulnerability is caused by a stack overwrite error when parsing the RTD
RealTimeData record (0813h), which could be exploited by attackers to
compromise a vulnerable system by tricking a user into opening a specially
crafted Excel document.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Office 2008 for Mac
Microsoft Office 2004 for Mac
Microsoft Excel 2002 Service Pack 3
Open XML File Format Converter for Mac


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-021 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0940
http://www.microsoft.com/technet/security/Bulletin/MS11-021.mspx


X. DISCLOSURE TIMELINE
-

2010-10-10 - Vulnerability Discovered by VUPEN
2011-04-12 - MS11-021 security update available




VUPEN Security Research - Microsoft Internet Explorer Layouts Use-after-free Vulnerability (CVE-2011-0094)

2011-04-15 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer Layouts Use-after-free 
Vulnerability (CVE-2011-0094)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Internet Explorer.

The vulnerability is caused by a use-after-free error in the
CSpliceTreeEngine::InsertSplice() function within the MSHTML library
when handling layouts, which could be exploited by remote attackers to
compromise a vulnerable system by tricking a user into visiting a specially
crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 for 32-bit Systems
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for Itanium-based Systems
Microsoft Windows Server 2008 for Itanium-based Systems Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-018 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0937
http://www.microsoft.com/technet/security/bulletin/MS11-018.mspx


X. DISCLOSURE TIMELINE
-

2010-05-20 - Vulnerability Discovered by VUPEN
2011-04-12 - MS11-018 security update available




VUPEN Security Research - Microsoft Office MSO Size Handling Integer Overflow Vulnerability

2011-04-13 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office MSO Size Handling Integer 
Overflow Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Office is a proprietary commercial office suite of inter-related
desktop applications, servers and services for the Microsoft Windows and
Mac OS X (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office.

The vulnerability is caused by an integer overflow error in the MSO 
component
when parsing certain values within an Office document, which could be 
exploited
by attackers to compromise a vulnerable system by tricking a user into 
opening

a malformed Office file (e.g. Word).

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) / CVE-2011-0041


III. AFFECTED PRODUCTS
---

Microsoft Office XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-029 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly and Chaouki Bekrar of 
VUPEN Security



VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0947
http://www.microsoft.com/technet/security/Bulletin/MS11-029.mspx


X. DISCLOSURE TIMELINE
-

2010-05-05 - Vulnerability Discovered by VUPEN
2011-04-12 - MS11-029 security update released




VUPEN Security Research - Microsoft Windows GDI+ Size Handling Integer Overflow Vulnerability

2011-04-13 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows GDI+ Size Handling Integer 
Overflow Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by an integer overflow error in the GDI+ library
when parsing certain values within a EMF image file, which could be 
exploited
by attackers to compromise a vulnerable system by tricking a user into 
visiting

a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) / CVE-2011-0041


III. AFFECTED PRODUCTS
---

Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2008 (32-bit)
Microsoft Windows Server 2008 (32-bit) Service Pack 2
Microsoft Windows Server 2008 (64x)
Microsoft Windows Server 2008 (64x) Service Pack 2
Microsoft Windows Server 2008 (Itanium)
Microsoft Windows Server 2008 (Itanium) Service Pack 2


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-029 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly and Chaouki Bekrar of 
VUPEN Security



VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0946
http://www.microsoft.com/technet/security/Bulletin/MS11-029.mspx


X. DISCLOSURE TIMELINE
-

2010-02-01 - Vulnerability Discovered by VUPEN
2011-04-12 - MS11-029 security update released




VUPEN Security Research - Apple Safari WebKit Iframe Event Handling Remote Use-after-free

2011-03-14 Thread VUPEN Security Research
VUPEN Security Research - Apple Safari WebKit Iframe Event Handling Remote 
Use-after-free


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Apple Safari is a web browser developed by Apple. As of February 2010,
Safari was the fourth most widely used browser, with 4.45% of the
worldwide usage share of web browsers according to Net Application.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Apple Safari.

The vulnerability is caused by a use-after-free error in the WebKit
library when handling certain iframe events, which could be exploited by
remote attackers to compromise a vulnerable system by tricking a user into
visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Apple Safari version 5.0.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Apple Safari version 5.0.4.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0641
http://support.apple.com/kb/HT4566


X. DISCLOSURE TIMELINE
-

2010-10-17 - Vulnerability Discovered by VUPEN
2010-10-20 - VUPEN TPP customers informed
2011-03-09 - MS11-006 security update available




VUPEN Security Research - Apple Safari WebKit Scroll Event Handling Remote Use-after-free

2011-03-14 Thread VUPEN Security Research
VUPEN Security Research - Apple Safari WebKit Scroll Event Handling Remote 
Use-after-free


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Apple Safari is a web browser developed by Apple. As of February 2010,
Safari was the fourth most widely used browser, with 4.45% of the
worldwide usage share of web browsers according to Net Application.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Apple Safari.

The vulnerability is caused by a use-after-free error in the WebKit
library when handling certain scroll events, which could be exploited by
remote attackers to compromise a vulnerable system by tricking a user into
visiting a specially crafted web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Apple Safari version 5.0.3 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Apple Safari version 5.0.4.


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0641
http://support.apple.com/kb/HT4566


X. DISCLOSURE TIMELINE
-

2010-11-17 - Vulnerability Discovered by VUPEN
2010-11-20 - VUPEN TPP customers informed
2011-03-09 - Apple Safari version 5.0.4 released




VUPEN Security Research - Adobe Shockwave DIRAPI LCTX Chunck Memory Corruption Vulnerability (APSB11-01)

2011-02-14 Thread VUPEN Security Research
VUPEN Security Research - Adobe Shockwave DIRAPI Lctx Chunck Memory 
Corruption Vulnerability (APSB11-01)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Over 450 million Internet-enabled desktops have installed Adobe Shockwave
Player. These people now have access to some of the best the Web has to 
offer

including dazzling 3D games and entertainment, interactive product
demonstrations, and online learning applications. Shockwave Player displays
Web content that has been created by Adobe Director. from Adobe.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Adobe Shockwave.

The vulnerability is caused by a memory corruption error in the DIRAPI.dll
module when processing the LCTX chunk within a Director File, which could
be exploited by remote attackers to execute arbitrary code by tricking a
user into visiting a malicious web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Adobe Shockwave Player version 11.5.9.615 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


VUPEN TPP customers have been protected against this vulnerability 9 months
before the release of the Adobe patch.

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Adobe Shockwave Player version 11.5.9.620.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0335
http://www.adobe.com/support/security/bulletins/apsb11-01.html


X. DISCLOSURE TIMELINE
-

2010-05-15 - Vulnerability Discovered by VUPEN
2010-05-17 - VUPEN TPP customers informed
2010-xx-xx - Vulnerability rediscovered by third parties
2011-02-08 - Adobe security update released




VUPEN Security Research - Microsoft Internet Explorer mshtml.dll Dangling Pointer Vulnerability (CVE-2011-0036)

2011-02-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer mshtml.dll Dangling 
Pointer Vulnerability (CVE-2011-0036)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a dangling pointer in the mshtml.dll
library when handling certain object manipulations, which could be exploited
by remote attackers to execute arbitrary code by tricking a user into
visiting a malicious web page.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6

Microsoft Windows 7 (32-bit)
Microsoft Windows 7 (64x)
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2008 (32-bit)
Microsoft Windows Server 2008 (32-bit) Service Pack 2
Microsoft Windows Server 2008 (64x)
Microsoft Windows Server 2008 (64x) Service Pack 2
Microsoft Windows Server 2008 (Itanium)
Microsoft Windows Server 2008 (Itanium) Service Pack 2
Microsoft Windows Server 2008 R2 (64x)
Microsoft Windows Server 2008 R2 (Itanium)
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
with ASLR and DEP bypass are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


VUPEN TPP customers have been protected against this vulnerability 8 months
before the release of the Microsoft patch.

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-003 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0318
http://www.microsoft.com/technet/security/bulletin/MS11-003.mspx


X. DISCLOSURE TIMELINE
-

2010-06-15 - Vulnerability Discovered by VUPEN
2010-06-17 - VUPEN TPP customers informed
2010-xx-xx - Vulnerability rediscovered by third parties
2011-02-08 - MS11-003 security update available




VUPEN Security Research - Microsoft Windows Shell Graphics BMP width Integer Overflow Vulnerability

2011-02-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows Shell Graphics BMP width 
Integer Overflow Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by an integer overflow error in the Windows
Shell graphics processor when parsing the width value within BMP images,
which could be exploited by remote attackers to compromise a vulnerable
system by tricking a user into opening or previewing a malformed Office
file or browsing to a network share, UNC, or WebDAV location containing
a specially crafted image.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Windows Server 2008 (32-bit)
Microsoft Windows Server 2008 (32-bit) Service Pack 2
Microsoft Windows Server 2008 (Itanium)
Microsoft Windows Server 2008 (Itanium) Service Pack 2
Microsoft Windows Server 2008 (x64)
Microsoft Windows Server 2008 (x64) Service Pack 2
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-006 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0018
http://www.microsoft.com/technet/security/bulletin/MS11-006.mspx


X. DISCLOSURE TIMELINE
-

2011-01-15 - Vulnerability Discovered by VUPEN
2011-02-08 - MS11-006 security update available




VUPEN Security Research - Microsoft Windows Shell Graphics BMP height Integer Overflow Vulnerability

2011-02-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows Shell Graphics BMP height 
Integer Overflow Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by an integer overflow error in the Windows
Shell graphics processor when parsing the height value within BMP images,
which could be exploited by remote attackers to compromise a vulnerable
system by tricking a user into opening or previewing a malformed Office
file or browsing to a network share, UNC, or WebDAV location containing
a specially crafted image.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Windows Server 2008 (32-bit)
Microsoft Windows Server 2008 (32-bit) Service Pack 2
Microsoft Windows Server 2008 (Itanium)
Microsoft Windows Server 2008 (Itanium) Service Pack 2
Microsoft Windows Server 2008 (x64)
Microsoft Windows Server 2008 (x64) Service Pack 2
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-006 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0018
http://www.microsoft.com/technet/security/bulletin/MS11-006.mspx


X. DISCLOSURE TIMELINE
-

2011-01-15 - Vulnerability Discovered by VUPEN
2011-02-08 - MS11-006 security update available




VUPEN Security Research - Microsoft Windows Shell Graphics biCompression Buffer Overflow Vulnerability

2011-02-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Windows Shell Graphics biCompression 
Buffer Overflow Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Windows is a series of software operating systems and graphical
user interfaces produced by Microsoft. Windows had approximately 90% of
the market share of the client operating systems. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Windows.

The vulnerability is caused by a buffer overflow error in the Windows
Shell graphics processor when parsing the biCompression value within
BMP images, which could be exploited by remote attackers to compromise
a vulnerable system by tricking a user into opening or previewing a
malformed Office file or browsing to a network share, UNC, or WebDAV
location containing a specially crafted image.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Microsoft Windows Server 2008 (32-bit)
Microsoft Windows Server 2008 (32-bit) Service Pack 2
Microsoft Windows Server 2008 (Itanium)
Microsoft Windows Server 2008 (Itanium) Service Pack 2
Microsoft Windows Server 2008 (x64)
Microsoft Windows Server 2008 (x64) Service Pack 2
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista Service Pack 2
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Vista x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 SP2 (Itanium)
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a proof-of-concept code
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

To proactively protect critical networks and infrastructures against 
unpatched
vulnerabilities and reduce risks related to zero-day attacks, VUPEN shares 
its
vulnerability research with governments and organizations members of the 
VUPEN

Threat Protection Program (TPP).

VUPEN TPP customers receive fully detailed and technical reports about 
security
vulnerabilities discovered by VUPEN and in advance of their public 
disclosure.


http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply the MS11-006 security update.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0018
http://www.microsoft.com/technet/security/bulletin/MS11-006.mspx


X. DISCLOSURE TIMELINE
-

2011-01-17 - Vulnerability Discovered by VUPEN
2011-02-08 - MS11-006 security update available




VUPEN Security Research - Novell GroupWise TZID Variable Remote Buffer Overflow Vulnerability (VUPEN-SR-2011-004)

2011-01-27 Thread VUPEN Security Research
VUPEN Security Research - Novell GroupWise VCALENDAR TZID Variable Remote 
Buffer Overflow Vulnerability (VUPEN-SR-2011-004)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Novell GroupWise collaboration software is a premier collaboration tool
for large enterprise. Look no further than Novell for your collaboration
software. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Novell GroupWise.

The vulnerability is caused by a buffer overflow error in the g1.dll
module when processing the TZID variable within VCALENDAR data, which
could be exploited by remote unauthenticated attackers to execute arbitrary
code with SYSTEM privileges.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Novell GroupWise version 8.02 HP 1 (Hot Patch 1) and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) receive advanced notifications about security
vulnerabilities discovered by VUPEN, and have access to a detailed detection
guidance to proactively protect national and critical infrastructures
against potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Novell GroupWise version 8.02 HP 2 (Hot Patch 2).


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0220
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4325
http://www.novell.com/support/viewContent.do?externalId=7007638sliceId=1


X. DISCLOSURE TIMELINE
-

2010-11-22 - Vulnerability discovered
2010-xx-xx - Vulnerability rediscovered by third parties including ZDI
2011-01-25 - Novell fix released




VUPEN Security Research - Microsoft Office Publisher Memory Corruption Vulnerability (VUPEN-SR-2010-041)

2010-12-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Publisher Memory Corruption 
Vulnerability (VUPEN-SR-2010-041)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Publisher, is a desktop publishing application from Microsoft. It 
is
an entry-level application, differing from Microsoft Word in that the 
emphasis
is placed on page layout and design rather than text composition and 
proofing.

from wikipedia.org


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Publisher.

The vulnerability is caused by a memory corruption error when handling 
malformed

Publisher documents, which could be exploited by remote attackers to execute
arbitrary code by tricking a user into opening a malicious PUB file.

Note: The Publisher file format is not publicly documented.


III. AFFECTED PRODUCTS
---

Microsoft Publisher 2010 (32-bit editions)
Microsoft Publisher 2010 (64-bit editions)
Microsoft Publisher 2003 Service Pack 3
Microsoft Publisher 2002 Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-103 security updates.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.microsoft.com/technet/security/bulletin/ms10-103.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3954


X. DISCLOSURE TIMELINE
-

2010-03-18 - Vendor notified
2010-03-18 - Vendor response
2010-12-08 - Status update received
2010-12-14 - Coordinated disclosure




VUPEN Security Research - Microsoft Office Publisher Size Value Heap Corruption Vulnerability (VUPEN-SR-2010-200)

2010-12-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Publisher Size Value Heap 
Corruption Vulnerability (VUPEN-SR-2010-200)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Publisher, is a desktop publishing application from Microsoft. It 
is
an entry-level application, differing from Microsoft Word in that the 
emphasis
is placed on page layout and design rather than text composition and 
proofing.

from wikipedia.org


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Publisher.

The vulnerability is caused by a heap corruption error in pubconv.dll 
while

trusting a size value from a Publisher document, which could be exploited by
remote attackers to execute arbitrary code by tricking a user into opening a
malicious PUB file.

Note: The Publisher file format is not publicly documented.


III. AFFECTED PRODUCTS
---

Microsoft Publisher 2007 Service Pack 2
Microsoft Publisher 2003 Service Pack 3
Microsoft Publisher 2002 Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-103 security updates.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.microsoft.com/technet/security/bulletin/ms10-103.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2569


X. DISCLOSURE TIMELINE
-

2010-04-26 - Vendor notified
2010-04-26 - Vendor response
2010-12-08 - Status update received
2010-12-14 - Coordinated disclosure




VUPEN Security Research - Microsoft Office Publisher Record Array Indexing Vulnerability (VUPEN-SR-2010-201)

2010-12-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Publisher Record Array Indexing 
Vulnerability (VUPEN-SR-2010-201)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Publisher, is a desktop publishing application from Microsoft. It 
is
an entry-level application, differing from Microsoft Word in that the 
emphasis
is placed on page layout and design rather than text composition and 
proofing.

from wikipedia.org


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Publisher.

The vulnerability is caused by an array indexing error when processing a
malformed record within a Publisher document, which could be exploited by
remote attackers to execute arbitrary code by tricking a user into opening
a malicious PUB file.

Note: The Publisher file format is not publicly documented.


III. AFFECTED PRODUCTS
---

Microsoft Publisher 2002 Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-103 security updates.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.microsoft.com/technet/security/bulletin/ms10-103.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3955


X. DISCLOSURE TIMELINE
-

2010-04-26 - Vendor notified
2010-04-26 - Vendor response
2010-12-08 - Status update received
2010-12-14 - Coordinated disclosure




VUPEN Security Research - Microsoft Internet Explorer Animation Use-after-free Vulnerability (VUPEN-SR-2010-199)

2010-12-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Internet Explorer Animation 
Use-after-free Vulnerability (VUPEN-SR-2010-199)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Internet Explorer is a web browser developed by Microsoft and
included as part of the Microsoft Windows line of operating systems with
more than 60% of the worldwide usage share of web browsers. (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Internet Explorer.

The vulnerability is caused by a use-after-free vulnerability when handling
certain animation behaviours, which could be exploited by remote attackers
to execute arbitrary code by tricking a user into visiting a malicious web
page.


III. AFFECTED PRODUCTS
---

Internet Explorer 6 for Windows XP Service Pack 3
Internet Explorer 6 for Windows XP Professional x64 Edition Service Pack 2
Internet Explorer 6 for Windows Server 2003 Service Pack 2
Internet Explorer 6 for Windows Server 2003 x64 Edition Service Pack 2
Internet Explorer 6 for Windows Server 2003 SP2 (Itanium)


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-090 security updates.


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.microsoft.com/technet/security/bulletin/ms10-090.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3343


X. DISCLOSURE TIMELINE
-

2010-04-29 - Vendor notified
2010-04-29 - Vendor response
2010-12-01 - Status update received
2010-12-14 - Coordinated disclosure




VUPEN Security Research - Microsoft Office Publisher pubconv.dll Array Indexing Vulnerability (VUPEN-SR-2010-206)

2010-12-16 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Publisher pubconv.dll Array 
Indexing Vulnerability (VUPEN-SR-2010-206)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Publisher, is a desktop publishing application from Microsoft. It 
is
an entry-level application, differing from Microsoft Word in that the 
emphasis
is placed on page layout and design rather than text composition and 
proofing.

from wikipedia.org


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Publisher.

The vulnerability is caused by an array indexing error in pubconv.dll when
processing a malformed value within a Publisher document, which could be
exploited by remote attackers to execute arbitrary code by tricking a user
into opening a malicious PUB file.

Note: The Publisher file format is not publicly documented.


III. AFFECTED PRODUCTS
---

Microsoft Publisher 2003 Service Pack 3
Microsoft Publisher 2002 Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-103 security updates.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.microsoft.com/technet/security/bulletin/ms10-103.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2571


X. DISCLOSURE TIMELINE
-

2010-04-26 - Vendor notified
2010-04-26 - Vendor response
2010-12-08 - Status update received
2010-12-14 - Coordinated disclosure




VUPEN Security Research - RealPlayer Sound Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-004)

2010-12-14 Thread VUPEN Security Research
VUPEN Security Research - RealPlayer Sound Data Handling Buffer Overflow 
Vulnerability (VUPEN-SR-2010-004)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

RealPlayer is a media player available to play, manage and download all 
your mp3,

flash and video files from real.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in RealPlayer.

The vulnerability is caused by a heap overflow error when handling sound
data within media files, which could be exploited by remote attackers to 
execute
arbitrary code by tricking a user into visiting a specially crafted web 
page.



III. AFFECTED PRODUCTS
---

RealPlayer 11.0 - 11.1
RealPlayer SP 1.0 - 1.0.1
RealPlayer SP 1.0.2 - 1.1.1
RealPlayer SP 1.1.2 - 1.1.4
RealPlayer Enterprise 2.1.2
Mac RealPlayer 11.0 - 11.1
Linux RealPlayer 11.0.2.1744


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis  
Exploits

Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to fixed versions :
http://service.real.com/realplayer/security/12102010_player/en/


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://service.real.com/realplayer/security/12102010_player/en/


X. DISCLOSURE TIMELINE
-

2010-02-25 - Vendor notified
2010-12-05 - Status update received
2010-12-10 - Coordinated disclosure




VUPEN Security Research - RealPlayer Audio Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-003)

2010-12-14 Thread VUPEN Security Research
VUPEN Security Research - RealPlayer Audio Data Handling Buffer Overflow 
Vulnerability (VUPEN-SR-2010-003)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

RealPlayer is a media player available to play, manage and download all 
your mp3,

flash and video files from real.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in RealPlayer.

The vulnerability is caused by a heap overflow error when handling Audio 
data

within media files, which could be exploited by remote attackers to execute
arbitrary code by tricking a user into visiting a specially crafted web 
page.



III. AFFECTED PRODUCTS
---

RealPlayer 11.0 - 11.1
RealPlayer SP 1.0 - 1.0.1
RealPlayer SP 1.0.2 - 1.1.1
RealPlayer SP 1.1.2 - 1.1.4
RealPlayer Enterprise 2.1.2
Mac RealPlayer 11.0 - 11.1
Linux RealPlayer 11.0.2.1744


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis  
Exploits

Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to fixed versions :
http://service.real.com/realplayer/security/12102010_player/en/


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://service.real.com/realplayer/security/12102010_player/en/


X. DISCLOSURE TIMELINE
-

2010-02-25 - Vendor notified
2010-12-05 - Status update received
2010-12-10 - Coordinated disclosure




VUPEN Security Research - RealPlayer AAC Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-005)

2010-12-14 Thread VUPEN Security Research
VUPEN Security Research - RealPlayer AAC Data Handling Buffer Overflow 
Vulnerability (VUPEN-SR-2010-005)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

RealPlayer is a media player available to play, manage and download all 
your mp3,

flash and video files from real.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in RealPlayer.

The vulnerability is caused by a heap overflow error when handling malformed
AAC files, which could be exploited by remote attackers to execute arbitrary
code by tricking a user into visiting a specially crafted web page.


III. AFFECTED PRODUCTS
---

RealPlayer 11.0 - 11.1
RealPlayer SP 1.0 - 1.0.1
RealPlayer SP 1.0.2 - 1.1.1
RealPlayer SP 1.1.2 - 1.1.4
RealPlayer Enterprise 2.1.2
Mac RealPlayer 11.0 - 11.1
Mac RealPlayer 12.0.0.1444


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis  
Exploits

Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to fixed versions :
http://service.real.com/realplayer/security/12102010_player/en/


VII. CREDIT
--

This vulnerability was discovered by Nicolas Joly of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://service.real.com/realplayer/security/12102010_player/en/


X. DISCLOSURE TIMELINE
-

2010-02-25 - Vendor notified
2010-12-05 - Status update received
2010-12-10 - Coordinated disclosure




VUPEN Security Research - RealPlayer RealMedia Data Handling Heap Overflow Vulnerabilities (VUPEN-SR-2010-28, VUPEN-SR-2010-29, VUPEN-SR-2010-30)

2010-12-14 Thread VUPEN Security Research
VUPEN Security Research - RealPlayer RealMedia Data Handling Heap Overflow 
Vulnerabilities (VUPEN-SR-2010-28, VUPEN-SR-2010-29, VUPEN-SR-2010-30)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

RealPlayer is a media player available to play, manage and download all 
your mp3,

flash and video files from real.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered three critical vulnerabilities
in RealPlayer.

These vulnerabilities are caused by heap overflow errors when handling 
malformed
RealMedia data, which could be exploited by remote attackers to execute 
arbitrary

code by tricking a user into visiting a specially crafted web page.


III. AFFECTED PRODUCTS
---

RealPlayer 11.0 - 11.1
RealPlayer SP 1.0 - 1.0.1
RealPlayer SP 1.0.2 - 1.1.1
RealPlayer SP 1.1.2 - 1.1.4
RealPlayer Enterprise 2.1.2
Linux RealPlayer 11.0.2.1744


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerabilities and code execution exploits
or proof-of-concept are available through the VUPEN Binary Analysis  
Exploits

Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to fixed versions :
http://service.real.com/realplayer/security/12102010_player/en/


VII. CREDIT
--

These vulnerabilities were discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://service.real.com/realplayer/security/12102010_player/en/


X. DISCLOSURE TIMELINE
-

2010-02-25 - Vendor notified
2010-12-05 - Status update received
2010-12-10 - Coordinated disclosure




VUPEN Security Research - RealPlayer RA5 Data Handling Heap Overflow Vulnerability (VUPEN-SR-2010-31)

2010-12-14 Thread VUPEN Security Research
VUPEN Security Research - RealPlayer RA5 Data Handling Heap Overflow 
Vulnerability (VUPEN-SR-2010-31)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

RealPlayer is a media player available to play, manage and download all 
your mp3,

flash and video files from real.com


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in RealPlayer.

The vulnerability is caused by a heap overflow error when handling malformed
RA5 files, which could be exploited by remote attackers to execute arbitrary
code by tricking a user into visiting a specially crafted web page.


III. AFFECTED PRODUCTS
---

RealPlayer 11.0 - 11.1
RealPlayer SP 1.0 - 1.0.1
RealPlayer SP 1.0.2 - 1.1.1
RealPlayer SP 1.1.2 - 1.1.4
RealPlayer Enterprise 2.1.2
Mac RealPlayer 11.0 - 11.1
Mac RealPlayer 12.0.0.1444
Linux RealPlayer 11.0.2.1744


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
or proof-of-concept are available through the VUPEN Binary Analysis 
Exploits
Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to fixed versions :
http://service.real.com/realplayer/security/12102010_player/en/


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://service.real.com/realplayer/security/12102010_player/en/


X. DISCLOSURE TIMELINE
-

2010-02-25 - Vendor notified
2010-12-05 - Status update received
2010-12-10 - Coordinated disclosure




VUPEN Security Research - Apple Safari Selections Handling Use-after-free Vulnerability (VUPEN-SR-2010-246)

2010-11-19 Thread VUPEN Security Research
VUPEN Security Research - Apple Safari Selections Handling Use-after-free 
Vulnerability (VUPEN-SR-2010-246)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Apple Safari is a web browser developed by Apple. As of February 2010,
Safari was the fourth most widely used browser, with 4.45% of the
worldwide usage share of web browsers according to Net Application.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Apple Safari.

The vulnerability is caused by a use-after-free in WebKit when handling
selections, which could be exploited by remote attackers to execute
arbitrary code by tricking a user into visiting a specially crafted web 
page.



III. AFFECTED PRODUCTS
---

Apple Safari version 5.0.2 and prior
Apple Safari version 4.1.2 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
with ASLR and DEP bypass are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Governments and Intelligence agencies who are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Apple Safari version 5.0.3 or 4.1.3


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://support.apple.com/kb/HT4455


X. DISCLOSURE TIMELINE
-

2010-07-30 - TPP Customers notified
2010-11-19 - Vulnerability Fixed



VUPEN Security Research - Apple Safari Scrollbar Handling Use-after-free Vulnerability (VUPEN-SR-2010-245)

2010-11-19 Thread VUPEN Security Research
VUPEN Security Research - Apple Safari Scrollbar Handling Use-after-free 
Vulnerability (VUPEN-SR-2010-245)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Apple Safari is a web browser developed by Apple. As of February 2010,
Safari was the fourth most widely used browser, with 4.45% of the
worldwide usage share of web browsers according to Net Application.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Apple Safari.

The vulnerability is caused by a use-after-free in WebKit when handling
scrollbars, which could be exploited by remote attackers to execute
arbitrary code by tricking a user into visiting a specially crafted web 
page.



III. AFFECTED PRODUCTS
---

Apple Safari version 5.0.2 and prior
Apple Safari version 4.1.2 and prior


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
with ASLR and DEP bypass are available through the VUPEN Binary Analysis 
Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Governments and Intelligence agencies who are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Apple Safari version 5.0.3 or 4.1.3


VII. CREDIT
--

This vulnerability was discovered by Matthieu Bonetti of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://support.apple.com/kb/HT4455


X. DISCLOSURE TIMELINE
-

2010-07-22 - TPP Customers notified
2010-11-19 - Vulnerability Fixed in Safari




VUPEN Security Research - Microsoft Office Word Bookmarks Invalid Pointer Vulnerability (CVE-2010-3216)

2010-10-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Word Bookmarks Invalid Pointer 
Vulnerability (CVE-2010-3216)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Office Word, included in the Microsoft Office suite,
is a powerful authoring program that gives the ability to create
and share documents by combining a comprehensive set of writing
tools with the easy-to-use Microsoft Office Fluent user interface.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Word.

The vulnerability is caused by the use of an invalid pointer when processing
bookmarks in a Word document, which could be exploited by remote
attackers to execute arbitrary code by tricking a user into opening
a specially crafted Word file.


III. AFFECTED PRODUCTS
---

Microsoft Office 2004 for Mac
Microsoft Office 2002 Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerabilities fixed by Microsoft
in October 2010 and code execution exploits or PoCs are available
through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Governments and Intelligence agencies who are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-079 security update.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/advisories/2010/2626
http://www.microsoft.com/technet/security/bulletin/ms10-079.mspx
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3216


X. DISCLOSURE TIMELINE
-

2010-04-08 - Vendor notified
2010-04-08 - Vendor response
2010-08-09 - Status update received
2010-10-12 - Coordinated public Disclosure




VUPEN Security Research - Microsoft Office Word Document Array Indexing Vulnerability (CVE-2010-2750)

2010-10-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Word Document Array Indexing 
Vulnerability (CVE-2010-2750)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Office Word, included in the Microsoft Office suite,
is a powerful authoring program that gives the ability to create
and share documents by combining a comprehensive set of writing
tools with the easy-to-use Microsoft Office Fluent user interface.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Word.

The vulnerability is caused by an array indexing error when processing
certain values in a Word document, which could be exploited by remote
attackers to execute arbitrary code by tricking a user into opening a
specially crafted Word file.


III. AFFECTED PRODUCTS
---

Microsoft Office 2004 for Mac
Microsoft Office XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerabilities fixed by Microsoft
in October 2010 and code execution exploits or PoCs are available
through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Governments and Intelligence agencies who are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-079 security update.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/advisories/2010/2626
http://www.microsoft.com/technet/security/bulletin/ms10-079.mspx
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2750


X. DISCLOSURE TIMELINE
-

2010-04-08 - Vendor and TPP customers notified
2010-04-08 - Vendor response
2010-08-09 - Status update received
2010-10-12 - Coordinated public Disclosure




VUPEN Security Research - Microsoft Office Excel Formula Substream Memory Corruption (CVE-2010-3234)

2010-10-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Excel Formula Substream Memory 
Corruption (CVE-2010-3234)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Office Excel is a powerful tool you can use to create and
format spreadsheets, and analyze and share information to make more
informed decisions. With the Microsoft Office Fluent user interface,
rich data visualization, and PivotTable views, professional-looking
charts are easier to create and use.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Excel.

The vulnerability is caused by a memory corruption error when parsing
Formula Substream records in an Excel file, which could be exploited
by remote attackers to execute arbitrary code by tricking a user into
opening a specially crafted Excel document.


III. AFFECTED PRODUCTS
---

Microsoft Office XP Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerabilities fixed by Microsoft
in October 2010 and code execution exploits or PoCs are available
through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Governments and Intelligence agencies who are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-080 security update.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/advisories/2010/2627
http://www.microsoft.com/technet/security/bulletin/ms10-080.mspx
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3234


X. DISCLOSURE TIMELINE
-

2010-04-02 - Vendor notified
2010-04-02 - Vendor response
2010-08-25 - Status update received
2010-10-12 - Coordinated public Disclosure




VUPEN Security Research - Microsoft Office Excel RealTimeData Array Indexing Vulnerability (CVE-2010-3240)

2010-10-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Excel RealTimeData Array Indexing 
Vulnerability (CVE-2010-3240)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Office Excel is a powerful tool you can use to create and
format spreadsheets, and analyze and share information to make more
informed decisions. With the Microsoft Office Fluent user interface,
rich data visualization, and PivotTable views, professional-looking
charts are easier to create and use.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Excel.

The vulnerability is caused by an array indexing error when processing
RealTimeData records in an Excel file, which could be exploited by remote
attackers to execute arbitrary code by tricking a user into opening a
specially crafted Excel document.


III. AFFECTED PRODUCTS
---

Microsoft Office 2007 Service Pack 2
Microsoft Office XP Service Pack 3
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 
File Formats Service Pack 2

Microsoft Excel Viewer Service Pack 2



IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerabilities fixed by Microsoft
in October 2010 and code execution exploits or PoCs are available
through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Governments and Intelligence agencies who are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-080 security update.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/advisories/2010/2627
http://www.microsoft.com/technet/security/bulletin/ms10-080.mspx
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3240


X. DISCLOSURE TIMELINE
-

2010-04-02 - Vendor notified
2010-04-02 - Vendor response
2010-08-25 - Status update received
2010-10-12 - Coordinated public Disclosure




VUPEN Security Research - Microsoft Office Word Return Value Handling Vulnerability (CVE-2010-3215)

2010-10-14 Thread VUPEN Security Research
VUPEN Security Research - Microsoft Office Word Return Value Handling 
Vulnerability (CVE-2010-3215)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Microsoft Office Word, included in the Microsoft Office suite,
is a powerful authoring program that gives the ability to create
and share documents by combining a comprehensive set of writing
tools with the easy-to-use Microsoft Office Fluent user interface.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Microsoft Office Word.

The vulnerability is caused by an error when handling return values while
parsing certain data in a Word document, which could be exploited by remote
attackers to execute arbitrary code by tricking a user into opening a
specially crafted Word file.


III. AFFECTED PRODUCTS
---

Microsoft Office 2004 for Mac
Microsoft Office 2002 Service Pack 3


IV. Binary Analysis  Exploits/PoCs
---

In-depth binary analysis of the vulnerabilities fixed by Microsoft
in October 2010 and code execution exploits or PoCs are available
through the VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Governments and Intelligence agencies who are members of the VUPEN Threat
Protection Program (TPP) have been alerted about the vulnerability when it
was discovered by VUPEN, and have received a detailed detection guidance
to proactively protect national and critical infrastructures against
potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Apply MS10-079 security update.


VII. CREDIT
--

This vulnerability was discovered by Chaouki Bekrar of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis  Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/advisories/2010/2626
http://www.microsoft.com/technet/security/bulletin/ms10-079.mspx
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3215


X. DISCLOSURE TIMELINE
-

2010-04-08 - Vendor notified
2010-04-08 - Vendor response
2010-08-09 - Status update received
2010-10-12 - Coordinated public Disclosure




  1   2   >