|
|
|
|
| |
Credit:
The information has been provided by Yorick Koster.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=856
|
| |
Vulnerable Systems:
* NOS Microsystems getPlus version 1.5.2.35 distributed by Adobe
* Adobe Download Manager for Windows prior to February 23, 2010
The vulnerability exists due to improper validation of the domain used to download and execute applications from. The vulnerable code always assumes that the domain being validated is a subdomain, which can lead to a logic error when comparing the valid domain and the requested domain.
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the user viewing the web page. To exploit this vulnerability, a targeted user must load a malicious webpage created by an attacker. An attacker typically accomplishes this via social engineering or injecting content into compromised, trusted sites. After the user visits the malicious web page, no further user interaction is needed.
Patch Availability:
Adobe Systems Inc. has released a solution which addresses this issue. Information about downloadable vendor updates can be found by clicking on the following URL:
http://www.adobe.com/support/security/bulletins/apsb10-08.html
Workaround:
Setting the killbit for CLSID 'CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7' will prevent this control from loading in Internet Explorer.
CVE Information:
CVE-2010-0189
Disclosure Timeline:
06/09/2009 Initial Vendor Notification
06/09/2009 Initial Vendor Reply
02/23/2010 Coordinated Public Disclosure
|
|
|
|
|