ID

VAR-201209-0448


CVE

CVE-2012-4876


TITLE

TRENDnet TV-IP121WN ActiveX Control 'OpenFileDlg()' Method Buffer Overflow Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2012-1628 // BID: 52760

DESCRIPTION

Stack-based buffer overflow in the UltraMJCam ActiveX Control in TRENDnet SecurView TV-IP121WN Wireless Internet Camera allows remote attackers to execute arbitrary code via a long string to the OpenFileDlg method. TRENDnet TV-IP121WN is a network camera solution for surveillance. When browsing the TRENDnet TV-IP121WN device WEB interface, you will be asked to install the ActiveX control. The UltraMJCamX.ocx control incorrectly calls the OpenFileDlg() method. The attacker can submit the long parameter. Because the Unsafe call to the WideCharToMultiByte() overflow buffer is used, the vulnerability is successfully exploited. You can execute arbitrary code in the context of your application. TRENDnet TV-IP121WN is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Failed exploit attempts will result in denial-of-service conditions. If the attack fails, it will result in a denial of service. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: TRENDnet UltraMJCam ActiveX Control Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA48601 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48601/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48601 RELEASE DATE: 2012-03-29 DISCUSS ADVISORY: http://secunia.com/advisories/48601/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48601/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48601 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Andrea Micalizzi has discovered a vulnerability in TRENDnet UltraMJCam ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is confirmed in version 1.1.52.18. Other versions may also be affected. SOLUTION: Set the kill-bit for the ActiveX control. PROVIDED AND/OR DISCOVERED BY: Andrea Micalizzi (rgod) ORIGINAL ADVISORY: http://retrogod.altervista.org/9sg_trendnet_adv.htm OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2012-4876 // JVNDB: JVNDB-2012-004188 // CNVD: CNVD-2012-1628 // BID: 52760 // IVD: bac80742-1f6d-11e6-abef-000c29c66e3d // VULHUB: VHN-58157 // PACKETSTORM: 111447

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None // IVD: bac80742-1f6d-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1628

AFFECTED PRODUCTS

vendor:trendnetmodel:securview wireless internet camera activex controlscope:eqversion:1.1.52.18

Trust: 1.6

vendor:trendnetmodel:securview wireless internet camerascope:eqversion:tv-ip121wn

Trust: 1.0

vendor:trendnetmodel:tv-ip121wnscope:eqversion:0

Trust: 0.9

vendor:trendnetmodel:securview wireless internet camerascope:eqversion:(tv-ip121wn)

Trust: 0.8

vendor:trendnetmodel:securview wireless internet camera ultramjcam activex controlscope: - version: -

Trust: 0.8

vendor:securview internet camera activex controlmodel: - scope:eqversion:1.1.52.18

Trust: 0.2

vendor:securview internet cameramodel:tv-ip121wnscope: - version: -

Trust: 0.2

sources: IVD: bac80742-1f6d-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1628 // BID: 52760 // JVNDB: JVNDB-2012-004188 // CNNVD: CNNVD-201203-545 // NVD: CVE-2012-4876

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4876
value: HIGH

Trust: 1.0

NVD: CVE-2012-4876
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201203-545
value: CRITICAL

Trust: 0.6

IVD: bac80742-1f6d-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-58157
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-4876
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: bac80742-1f6d-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-58157
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: bac80742-1f6d-11e6-abef-000c29c66e3d // VULHUB: VHN-58157 // JVNDB: JVNDB-2012-004188 // CNNVD: CNNVD-201203-545 // NVD: CVE-2012-4876

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-58157 // JVNDB: JVNDB-2012-004188 // NVD: CVE-2012-4876

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-545

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: bac80742-1f6d-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201203-545

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004188

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-58157

PATCH

title:Top Pageurl:http://www.trendnet.com/

Trust: 0.8

sources: JVNDB: JVNDB-2012-004188

EXTERNAL IDS

db:NVDid:CVE-2012-4876

Trust: 3.1

db:BIDid:52760

Trust: 2.6

db:SECUNIAid:48601

Trust: 1.8

db:OSVDBid:80661

Trust: 1.7

db:EXPLOIT-DBid:18675

Trust: 1.7

db:CNNVDid:CNNVD-201203-545

Trust: 0.9

db:CNVDid:CNVD-2012-1628

Trust: 0.8

db:JVNDBid:JVNDB-2012-004188

Trust: 0.8

db:NSFOCUSid:20687

Trust: 0.6

db:BUGTRAQid:20120328 TRENDNET SECURVIEW TV-IP121WN WIRELESS INTERNET CAMERA ULTRAMJCAM ACTIVEX CONTROL OPENFILEDLG WIDECHARTOMULTIBYTE REMOTE STACK BUFFER OVERFLOW

Trust: 0.6

db:IVDid:BAC80742-1F6D-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:OTHERid:NONE

Trust: 0.1

db:SEEBUGid:SSVID-72733

Trust: 0.1

db:SEEBUGid:SSVID-72761

Trust: 0.1

db:EXPLOIT-DBid:18709

Trust: 0.1

db:VULHUBid:VHN-58157

Trust: 0.1

db:PACKETSTORMid:111447

Trust: 0.1

sources: OTHER: None // IVD: bac80742-1f6d-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1628 // VULHUB: VHN-58157 // BID: 52760 // JVNDB: JVNDB-2012-004188 // PACKETSTORM: 111447 // CNNVD: CNNVD-201203-545 // NVD: CVE-2012-4876

REFERENCES

url:http://retrogod.altervista.org/9sg_trendnet_adv.htm

Trust: 2.7

url:http://www.securityfocus.com/bid/52760

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2012-03/0152.html

Trust: 1.7

url:http://www.exploit-db.com/exploits/18675

Trust: 1.7

url:http://osvdb.org/80661

Trust: 1.7

url:http://secunia.com/advisories/48601

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4876

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4876

Trust: 0.8

url:http://www.nsfocus.net/vulndb/20687

Trust: 0.6

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.trendnet.com/store/products/proddetail.asp?prod=175_tv-ip121wn&cat=151

Trust: 0.3

url:/archive/1/522112

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://secunia.com/advisories/48601/

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48601

Trust: 0.1

url:http://secunia.com/advisories/48601/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2012-1628 // VULHUB: VHN-58157 // BID: 52760 // JVNDB: JVNDB-2012-004188 // PACKETSTORM: 111447 // CNNVD: CNNVD-201203-545 // NVD: CVE-2012-4876

CREDITS

nospam

Trust: 0.9

sources: BID: 52760 // CNNVD: CNNVD-201203-545

SOURCES

db:OTHERid: -
db:IVDid:bac80742-1f6d-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1628
db:VULHUBid:VHN-58157
db:BIDid:52760
db:JVNDBid:JVNDB-2012-004188
db:PACKETSTORMid:111447
db:CNNVDid:CNNVD-201203-545
db:NVDid:CVE-2012-4876

LAST UPDATE DATE

2025-04-11T21:06:42.562000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1628date:2012-03-30T00:00:00
db:VULHUBid:VHN-58157date:2012-09-07T00:00:00
db:BIDid:52760date:2015-03-19T07:35:00
db:JVNDBid:JVNDB-2012-004188date:2012-09-11T00:00:00
db:CNNVDid:CNNVD-201203-545date:2012-03-30T00:00:00
db:NVDid:CVE-2012-4876date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:bac80742-1f6d-11e6-abef-000c29c66e3ddate:2012-03-30T00:00:00
db:CNVDid:CNVD-2012-1628date:2012-03-30T00:00:00
db:VULHUBid:VHN-58157date:2012-09-06T00:00:00
db:BIDid:52760date:2012-03-28T00:00:00
db:JVNDBid:JVNDB-2012-004188date:2012-09-11T00:00:00
db:PACKETSTORMid:111447date:2012-04-01T09:50:40
db:CNNVDid:CNNVD-201203-545date:2012-03-30T00:00:00
db:NVDid:CVE-2012-4876date:2012-09-06T21:55:03.207