|
|
| |
Credit:
The information has been provided by Carsten Eiram.
The original article can be found at: http://secunia.com/secunia_research/2009-3/
|
| |
Vulnerable Systems:
* Free Download Manager version 2.5 Build 758
* Free Download Manager version 3.0 Build 844
Immune Systems:
* Free Download Manager version 3.0 Build 848
The vulnerability is caused due to a boundary error in the Remote Control Server when processing "Authorization" headers in HTTP requests. This can be exploited to cause a stack-based buffer overflow via an HTTP request containing an overly long "Authorization" header.
Successful exploitation allows execution of arbitrary code.
Time Table:
20/01/2009 - Form submitted on the vendor's website asking for e-mail address of security contact.
27/01/2009 - E-mail sent to various e-mail addresses asking for contact information of security contact.
27/01/2009 - Vendor response (e-mail address of security contact provided).
28/01/2009 - Vulnerability details sent to the vendor.
28/01/2009 - Fixed version provided for testing by the vendor.
28/01/2009 - Vendor informed that vulnerability is fixed.
31/01/2009 - Vendor issues fixed version.
02/02/2009 - Public disclosure.
CVE Information:
CVE-2009-0183
|
|
|