ID

VAR-201209-0472


CVE

CVE-2012-4924


TITLE

ASUS Net4Switch for ipswcom.dll ActiveX Component buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-004429

DESCRIPTION

Buffer overflow in the CxDbgPrint function in the ipswcom.dll ActiveX component 1.0.0.1 for ASUS Net4Switch 1.0.0020 allows remote attackers to execute arbitrary code via a long parameter to the Alert method. ASUS Net4Switch is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. ASUS Net4Switch ipswcom.dll 1.0.0.1 is vulnerable; other versions may also be affected. ASUS Net4Switch is a network management software for ASUS computers. ---------------------------------------------------------------------- Secunia presentations @ RSA Conference 2012, San Francisco, USA, 27 Feb-02 March Listen to our Chief Security Specialist, Research Analyst Director, and Director Product Management & Quality Assurance discuss the industry's key topics. Also, visit the Secunia stand #817. Find out more: http://www.rsaconference.com/events/2012/usa/index.htm ---------------------------------------------------------------------- TITLE: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA48125 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48125/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48125 RELEASE DATE: 2012-02-22 DISCUSS ADVISORY: http://secunia.com/advisories/48125/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48125/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48125 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Digital Security Research Group has discovered a vulnerability in Net4Switch ipswcom ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string. Successful exploitation allows execution of arbitrary code. The vulnerability is confirmed in version 1.0.0020 (ipswcom 1.0.0.1). SOLUTION: Set the kill-bit for the affected ActiveX control. PROVIDED AND/OR DISCOVERED BY: Dmitriy Evdokimov, Digital Security Research Group ORIGINAL ADVISORY: DSECRG-12-017: http://dsecrg.com/pages/vul/show.php?id=417 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-4924 // JVNDB: JVNDB-2012-004429 // BID: 52110 // VULHUB: VHN-58205 // PACKETSTORM: 110070

AFFECTED PRODUCTS

vendor:asusmodel:ipswcom activex componentscope:eqversion:1.0.0.1

Trust: 1.6

vendor:asusmodel:net4switchscope:eqversion:1.0.0020

Trust: 1.6

vendor:asustek computermodel:ipswcom.dll activex componentscope:eqversion:1.0.0.1

Trust: 0.8

vendor:asustek computermodel:net4switchscope:eqversion:1.0.0020

Trust: 0.8

vendor:asusmodel:net4switch ipswcom.dllscope:eqversion:1.0.0.1

Trust: 0.3

sources: BID: 52110 // JVNDB: JVNDB-2012-004429 // CNNVD: CNNVD-201209-342 // NVD: CVE-2012-4924

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4924
value: HIGH

Trust: 1.0

NVD: CVE-2012-4924
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201209-342
value: CRITICAL

Trust: 0.6

VULHUB: VHN-58205
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-4924
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-58205
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-58205 // JVNDB: JVNDB-2012-004429 // CNNVD: CNNVD-201209-342 // NVD: CVE-2012-4924

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-58205 // JVNDB: JVNDB-2012-004429 // NVD: CVE-2012-4924

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-342

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201209-342

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004429

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-58205

PATCH

title:Top Pageurl:http://www.asus.com/

Trust: 0.8

sources: JVNDB: JVNDB-2012-004429

EXTERNAL IDS

db:NVDid:CVE-2012-4924

Trust: 2.8

db:BIDid:52110

Trust: 2.0

db:SECUNIAid:48125

Trust: 1.8

db:OSVDBid:79438

Trust: 1.7

db:EXPLOIT-DBid:18538

Trust: 1.7

db:JVNDBid:JVNDB-2012-004429

Trust: 0.8

db:CNNVDid:CNNVD-201209-342

Trust: 0.7

db:XFid:4

Trust: 0.6

db:XFid:73384

Trust: 0.6

db:SEEBUGid:SSVID-72625

Trust: 0.1

db:VULHUBid:VHN-58205

Trust: 0.1

db:PACKETSTORMid:110070

Trust: 0.1

sources: VULHUB: VHN-58205 // BID: 52110 // JVNDB: JVNDB-2012-004429 // PACKETSTORM: 110070 // CNNVD: CNNVD-201209-342 // NVD: CVE-2012-4924

REFERENCES

url:http://dsecrg.com/pages/vul/show.php?id=417

Trust: 1.8

url:http://www.securityfocus.com/bid/52110

Trust: 1.7

url:http://www.exploit-db.com/exploits/18538

Trust: 1.7

url:http://osvdb.org/79438

Trust: 1.7

url:http://secunia.com/advisories/48125

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/73384

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4924

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4924

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/73384

Trust: 0.6

url:http://www.dsecrg.com/pages/vul/show.php?id=417

Trust: 0.3

url:http://www.asus.com

Trust: 0.3

url:http://secunia.com/advisories/48125/#comments

Trust: 0.1

url:http://www.rsaconference.com/events/2012/usa/index.htm

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/48125/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48125

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-58205 // BID: 52110 // JVNDB: JVNDB-2012-004429 // PACKETSTORM: 110070 // CNNVD: CNNVD-201209-342 // NVD: CVE-2012-4924

CREDITS

Dmitriy Evdokimov, Digital Security Research Group

Trust: 0.3

sources: BID: 52110

SOURCES

db:VULHUBid:VHN-58205
db:BIDid:52110
db:JVNDBid:JVNDB-2012-004429
db:PACKETSTORMid:110070
db:CNNVDid:CNNVD-201209-342
db:NVDid:CVE-2012-4924

LAST UPDATE DATE

2025-04-11T21:29:14.746000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-58205date:2017-08-29T00:00:00
db:BIDid:52110date:2015-03-19T07:35:00
db:JVNDBid:JVNDB-2012-004429date:2012-09-19T00:00:00
db:CNNVDid:CNNVD-201209-342date:2012-09-19T00:00:00
db:NVDid:CVE-2012-4924date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-58205date:2012-09-15T00:00:00
db:BIDid:52110date:2012-02-17T00:00:00
db:JVNDBid:JVNDB-2012-004429date:2012-09-19T00:00:00
db:PACKETSTORMid:110070date:2012-02-22T08:42:33
db:CNNVDid:CNNVD-201209-342date:2012-09-19T00:00:00
db:NVDid:CVE-2012-4924date:2012-09-15T17:55:07.473