Secunia Security Advisory - Will Dormann has reported some vulnerabilities in the Motive Communications ActiveUtils EmailData ActiveX control, which potentially can be exploited by malicious people to compromise a user's system.
bf9c870bddb68e6716324176065b8cdaec0d8163f6fbb88fc8d646d067c85978
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Motive Communications ActiveUtils EmailData ActiveX Buffer Overflow
Vulnerabilities
SECUNIA ADVISORY ID:
SA26481
VERIFY ADVISORY:
https://secunia.com/advisories/26481/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Motive Service Activation Manager 5.x
https://secunia.com/product/15308/
Motive Service Activation Manager 4.x
https://secunia.com/product/15307/
Motive Self Service Manager 4.x
https://secunia.com/product/15312/
Motive Self Service Manager 5.x
https://secunia.com/product/15313/
DESCRIPTION:
Will Dormann has reported some vulnerabilities in the Motive
Communications ActiveUtils EmailData ActiveX control, which
potentially can be exploited by malicious people to compromise a
user's system.
The vulnerabilities are caused due to unspecified errors within the
ActiveEmailTest.EmailData (ActiveUtils.dll) ActiveX control, which
can be exploited to cause stack-based buffer overflows by e.g.
tricking a user into visiting a malicious website.
The vulnerabilities are reported in version 5.1 and prior.
SOLUTION:
Reportedly, automatic updates have been released to all corporate
customers and this is also fixed via MS07-045 (Cumulative Security
Update for Microsoft Internet Explorer).
https://www.microsoft.com/technet/security/Bulletin/MS07-045.mspx
Set the kill-bit for the affected ActiveX control.
PROVIDED AND/OR DISCOVERED BY:
Will Dormann, CERT/CC.
ORIGINAL ADVISORY:
Motive Security Bulletin:
https://www.motive.com/securitybulletin_08122007.asp
US-CERT VU#747233:
https://www.kb.cert.org/vuls/id/747233
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------