ID

VAR-200709-0151


CVE

CVE-2007-4916


TITLE

Microsoft MFC FindFile function heap buffer overflow

Trust: 0.8

sources: CERT/CC: VU#611008

DESCRIPTION

Heap-based buffer overflow in the FileFind::FindFile method in (1) MFC42.dll, (2) MFC42u.dll, (3) MFC71.dll, and (4) MFC71u.dll in Microsoft Foundation Class (MFC) Library 8.0, as used by the ListFiles method in hpqutil.dll 2.0.0.138 in Hewlett-Packard (HP) All-in-One and Photo & Imaging Gallery 1.1 and probably other products, allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long first argument. Microsoft Foundation Class (MFC) Included in library FindFile() The function contains a heap buffer overflow vulnerability. As a result, arbitrary code may be executed or service operation may be interrupted (DoS) There is a possibility of being attacked. Microsoft Foundation Class (MFC) The library Visual C++ Class library for MFC Is Microsoft Visual Studio And Microsoft Windows And may be used in many other applications. this MFC Included in the library FindFile() The function provides the ability to search for files from the entire file system. MFC42 Library and MFC70 Library FindFile() The function does not handle arguments properly, so heap buffer overflow vulnerability is included, resulting in arbitrary code execution and service disruption (DoS) There is a possibility of being attacked. <JPCERT/CC Supplemental information from > From Microsoft MFC 71 The library is not affected, MFC 70 It was confirmed that the library was affected. JVN So, with regard to the affected system, MFC 71 I mentioned it as a library. MFC 70 I corrected it to the library.Expected impact is affected MFC It depends on how the application using the library is working. Arbitrary code is executed or service operation is interrupted via the network or locally (DoS) There is a possibility of being attacked. This issue also occurs in the 'hpqutil.dll' ActiveX control identified by CLSID: F3F381A3-4795-41FF-8190-7AA2A8102F85. HP All-in-One Series Web Release and HP Photo and Imaging Gallery are prone to a heap-based buffer-overflow vulnerability because the applications fail to perform adequate boundary-checks on user-supplied data. Failed exploit attempts will result in a denial-of-service condition. Microsoft Windows is a series of operating systems released by Microsoft Corporation. Local attackers may use this vulnerability to elevate their own privileges. MFC[42|71].dll@CFileFind::FindFile(char const *,unsigned long) .text:73D6CD3F mov edi, edi .text:73D6CD41 push ebp .text:73D6CD42 push esi ; unsigned int .text:73D6CD43 push edi ; unsigned __int8 * .text:73D6CD44 mov esi, ecx .text:73D6CD46 call CFileFind::Close(void) .text:73D6CD4B push 140h ; int << 320 bytes .text:73D6CD50 call @operator new(uint) << buffer Allocate [1].text:73D6CD55 mov ebp, [esp+14h].text:73D6CD59 and dword ptr [esi+10h], 0 .text:73D6CD5D test ebp, ebp .text:73D6CD5F pop ecx .text:73D6CD60 mov [ esi+8], eax .text:73D6CD63 jnz short loc_73D6CD6A .text:73D6CD65 mov ebp, offset a__1 ; "*.*" << si arg_0 == NULL .text:73D6CD6A loc_73D6CD6A; CODE XREF: CFileFind::. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Microsoft Windows CFileFind Class "FindFile()" Buffer Overflow SECUNIA ADVISORY ID: SA26800 VERIFY ADVISORY: http://secunia.com/advisories/26800/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ DESCRIPTION: Jonathan Sarba has discovered a vulnerability in Microsoft Windows, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the "FindFile()" function of the CFileFind class in mfc42.dll and mfc42u.dll. This can be exploited to cause a heap-based buffer overflow by passing an overly long argument to the affected function. SOLUTION: Restrict access to applications allowing user-controlled input to be passed to the vulnerable function. Applications using the vulnerable library should check the length of the user input before passing it to the affected function. PROVIDED AND/OR DISCOVERED BY: Jonathan Sarba, GoodFellas Security Research Team. ORIGINAL ADVISORY: http://goodfellas.shellcode.com.ar/own/VULWKU200706142 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.15

sources: NVD: CVE-2007-4916 // CERT/CC: VU#611008 // JVNDB: JVNDB-2007-000698 // BID: 25697 // BID: 25673 // VULHUB: VHN-28278 // VULMON: CVE-2007-4916 // PACKETSTORM: 59323

AFFECTED PRODUCTS

vendor:hpmodel:photo and imaging galleryscope:eqversion:1.1

Trust: 1.6

vendor:hpmodel:all-in-on printerscope:eqversion:*

Trust: 1.0

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel:mfc42.dllscope: - version: -

Trust: 0.8

vendor:microsoftmodel:mfc70.dllscope: - version: -

Trust: 0.8

vendor:hpmodel:photo and image galleryscope:eqversion:1.1

Trust: 0.6

vendor:hpmodel:all-in-on printerscope: - version: -

Trust: 0.6

vendor:microsoftmodel:windows xp tablet pc edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp home sp2scope: - version: -

Trust: 0.3

vendor:hpmodel:all-in-one series web releasescope:eqversion:2.1

Trust: 0.3

vendor:hpmodel:all-in-one series web releasescope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#611008 // BID: 25697 // BID: 25673 // JVNDB: JVNDB-2007-000698 // CNNVD: CNNVD-200709-214 // NVD: CVE-2007-4916

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4916
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#611008
value: 12.93

Trust: 0.8

NVD: CVE-2007-4916
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200709-214
value: CRITICAL

Trust: 0.6

VULHUB: VHN-28278
value: HIGH

Trust: 0.1

VULMON: CVE-2007-4916
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4916
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-28278
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#611008 // VULHUB: VHN-28278 // VULMON: CVE-2007-4916 // JVNDB: JVNDB-2007-000698 // CNNVD: CNNVD-200709-214 // NVD: CVE-2007-4916

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-28278 // JVNDB: JVNDB-2007-000698 // NVD: CVE-2007-4916

THREAT TYPE

network

Trust: 0.6

sources: BID: 25697 // BID: 25673

TYPE

Boundary Condition Error

Trust: 0.6

sources: BID: 25697 // BID: 25673

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000698

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-28278 // VULMON: CVE-2007-4916

PATCH

title:CFileFind::FindFile (MFC)url:http://msdn2.microsoft.com/ja-jp/library/x4dz98yx(VS.80).aspx

Trust: 0.8

sources: JVNDB: JVNDB-2007-000698

EXTERNAL IDS

db:CERT/CCid:VU#611008

Trust: 3.7

db:SECUNIAid:26800

Trust: 3.5

db:NVDid:CVE-2007-4916

Trust: 2.9

db:BIDid:25697

Trust: 2.9

db:SECTRACKid:1018698

Trust: 2.6

db:BIDid:25673

Trust: 2.1

db:VUPENid:ADV-2007-3182

Trust: 1.8

db:SREASONid:3143

Trust: 1.8

db:XFid:36608

Trust: 1.4

db:JVNDBid:JVNDB-2007-000698

Trust: 0.8

db:XFid:36609

Trust: 0.6

db:BUGTRAQid:20070914 [GOODFELLAS-VULN] FILEFIND CLASS FROM MFC LIBRARY CAUSE HEAPOVERFLOW

Trust: 0.6

db:BUGTRAQid:20070914 [GOODFELLAS-VULN] ACTIVEX HPQUTIL!LISTFILES HPQUTIL.DLL - REMOTEHEAP OVERFLOW

Trust: 0.6

db:CNNVDid:CNNVD-200709-214

Trust: 0.6

db:EXPLOIT-DBid:4409

Trust: 0.2

db:EXPLOIT-DBid:30593

Trust: 0.1

db:SEEBUGid:SSVID-83968

Trust: 0.1

db:VULHUBid:VHN-28278

Trust: 0.1

db:VULMONid:CVE-2007-4916

Trust: 0.1

db:PACKETSTORMid:59323

Trust: 0.1

sources: CERT/CC: VU#611008 // VULHUB: VHN-28278 // VULMON: CVE-2007-4916 // BID: 25697 // BID: 25673 // JVNDB: JVNDB-2007-000698 // PACKETSTORM: 59323 // CNNVD: CNNVD-200709-214 // NVD: CVE-2007-4916

REFERENCES

url:http://goodfellas.shellcode.com.ar/own/vulwku200706142

Trust: 3.0

url:http://www.kb.cert.org/vuls/id/611008

Trust: 3.0

url:http://www.securityfocus.com/bid/25697

Trust: 2.7

url:http://www.securitytracker.com/id?1018698

Trust: 2.6

url:http://secunia.com/advisories/26800

Trust: 2.6

url:http://www.securityfocus.com/bid/25673

Trust: 1.8

url:http://goodfellas.shellcode.com.ar/own/vulwar200706041

Trust: 1.8

url:http://securityreason.com/securityalert/3143

Trust: 1.8

url:http://www.frsirt.com/english/advisories/2007/3182

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/36608

Trust: 1.4

url:http://www.securityfocus.com/archive/1/479442/100/0/threaded

Trust: 1.2

url:http://www.securityfocus.com/archive/1/479443/100/0/threaded

Trust: 1.2

url:http://www.vupen.com/english/advisories/2007/3182

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36609

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36608

Trust: 1.2

url:http://secunia.com/advisories/26800/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4916

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23611008/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4916

Trust: 0.8

url:http://support.microsoft.com/kb/240797

Trust: 0.6

url:/archive/1/479442

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/479443/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/479442/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/36609

Trust: 0.6

url:http://www.hp.com/

Trust: 0.3

url:http://www.microsoft.com/windows/default.mspx

Trust: 0.3

url:/archive/1/479443

Trust: 0.3

url:http://www.hp.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/4409/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/22/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#611008 // VULHUB: VHN-28278 // VULMON: CVE-2007-4916 // BID: 25697 // BID: 25673 // JVNDB: JVNDB-2007-000698 // PACKETSTORM: 59323 // CNNVD: CNNVD-200709-214 // NVD: CVE-2007-4916

CREDITS

Jonathan Sarba※ sarbaj@shellcode.com.ar

Trust: 0.6

sources: CNNVD: CNNVD-200709-214

SOURCES

db:CERT/CCid:VU#611008
db:VULHUBid:VHN-28278
db:VULMONid:CVE-2007-4916
db:BIDid:25697
db:BIDid:25673
db:JVNDBid:JVNDB-2007-000698
db:PACKETSTORMid:59323
db:CNNVDid:CNNVD-200709-214
db:NVDid:CVE-2007-4916

LAST UPDATE DATE

2025-04-10T23:01:05.350000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#611008date:2007-09-21T00:00:00
db:VULHUBid:VHN-28278date:2018-10-15T00:00:00
db:VULMONid:CVE-2007-4916date:2018-10-15T00:00:00
db:BIDid:25697date:2015-05-12T19:49:00
db:BIDid:25673date:2007-09-20T20:50:00
db:JVNDBid:JVNDB-2007-000698date:2008-01-23T00:00:00
db:CNNVDid:CNNVD-200709-214date:2007-10-08T00:00:00
db:NVDid:CVE-2007-4916date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#611008date:2007-09-20T00:00:00
db:VULHUBid:VHN-28278date:2007-09-17T00:00:00
db:VULMONid:CVE-2007-4916date:2007-09-17T00:00:00
db:BIDid:25697date:2007-09-14T00:00:00
db:BIDid:25673date:2007-09-14T00:00:00
db:JVNDBid:JVNDB-2007-000698date:2007-09-28T00:00:00
db:PACKETSTORMid:59323date:2007-09-18T14:57:18
db:CNNVDid:CNNVD-200709-214date:2007-09-17T00:00:00
db:NVDid:CVE-2007-4916date:2007-09-17T17:17:00