BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Microsoft Windows MFC Document Title Updating Buffer Overflow

Disclosed July 5, 2010    Fully Patched

Vulnerability Description:

Certain applications running on Microsoft Windows are vulnerable to a stack-based buffer overflow due to an error in the "UpdateFrameTitleForDocument" method in the CFrameWnd class within the Microsoft MFCDLL Shared Library (mfc42.dll). By creating an extremely long window title for an application that makes use of the vulnerable method, an attacker could execute arbitrary code in the context of the logged in user. Current reports indicate that PowerZip version 7.2 Build 4010 is one such application that is affected by this vulnerability; other third-party applications are likely affected.

Vendors:

Microsoft

Vulnerable Software/Devices:

Windows 2000 SP4 (NOTE:  Windows 2000 is no longer supported by Microsoft, and as such remains unpatched)
Windows XP SP2/SP3

Vulnerability Severity:

Medium

Exploit Availability:

N/A

BeyondTrust Prevention and Detection:

Mitigation:

There are no known forms of mitigating this vulnerability. It may be possible to limit client-side exploitation by restricting access to third-party applications that depend the MFCDLL Shared Library (i.e. mfc42.dll).

Links:

CVE(s):

None

Leave a Reply