Vulnerable Systems:
Authentium Command On Demand Online Scan (CSS Web Installer ActiveX V.1.4.9508.605)
Remote exploitation of a buffer overflow vulnerability in Authentium Command On Demand Online scanner service could allow an attacker to execute arbitrary code within the security context of the targeted user.
The affected function is "InstallProduct1". The functions "InstallProduct" and "InstallProduct2" seems to be also vulnerable.
Name: CSS Web Installer Class
Vendor: Authentium, Inc.
Type: ActiveX-Control
Version: 1.4.9508.605
Prog ID: CSSWEBLib.Installer
GUID: {6CCE3920-3183-4B3D-808A-B12EB769DE12}
File: cssweb.dll
Folder: C:\WINDOWS\Downloaded Program Files\
Safe for Script: True
Safe for Init: True
IObjectSafety: False
Workaround:
Disable the vulnerable ActiveX Control by setting the kill bit for the following CLSID:
{6CCE3920-3183-4B3D-808A-B12EB769DE12}
Save the following text as a .REG file and imported to set the kill bit for this control:
--------------------------------------
Windows Registry Editor Version 5.00
Disclosure Timeline:
2010.02.15: Vulnerability found
2010.02.22: Initial contact per Online forms [-] No Response
2010.03.01: Seconad contact per Online forms 2010.03.01: Initial vendor response
2010.03.04: Domain is down
2010.03.04: Release of this Advisory