BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Samsung NET-i Viewer Multiple Vulnerabilities

Disclosed April 24, 2012    Workaround Available

Vulnerability Description:

Samsung NET-i Viewer contains multiple vulnerable ActiveX controls. Specifically, STWConfigNVR and STWConfig may allow a virtual function call into arbitrary memory when processing the ConnectDDNS() function. Additionally, the UMS_Ctrl and UMS_Ctrl_STW ActiveX controls contain a stack-based buffer overflow when parsing an excessively long string passed to the fname parameter in the BackupToAvi() function.

Vendors:

Samsung

Vulnerable Software/Devices:

  • NET-i viewer 1.x

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 16268 - Samsung NET-i Viewer Multiple Vulnerabilities

Mitigation:

Set the kill-bit for the vulnerable ActiveX controls: 
3D6F2DBA-F4E5-40A6-8725-E99BC96CC23A
208650B1-3CA1-4406-926D-45F2DBB9C299
EEDBA32E-5C2D-48f1-A58E-0AAB0BC230E3
17A7F731-C9EC-461C-B813-2F42A1BB58EB

Links:

CVE(s):

None

Leave a Reply