Overview
The eBay Enhanced Picture Services (EPUImageControl Class) ActiveX control contains a buffer overflow vulnerability. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
ActiveX ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls.
eBay has provided the following steps to determine if the Enhanced Picture Services ActiveX control is installed: 1. Launch Internet Explorer 2. Select Tools -> Internet Options 3. Click "Settings..." button in the "Temporary Internet files" group 4. Click on "View Objects..." 5. This will launch Windows Explorer. In the Program File column you should see "EPUImageControl Class" . If you don't see this file, then the ActiveX is not installed. Otherwise right click on name, select the Version tab to see the ActiveX version The Problem The eBay Enhanced Picture Services ActiveX control version 1.0.3.36 and earlier contain a buffer overflow vulnerability. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash. |
Solution
Upgrade or patch
|
Remove the eBay Enhanced Picture Services ActiveX control
Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document and the Malicious Web Scripts FAQ. Disable the eBay Enhanced Picture Services ActiveX control The eBay Enhanced Picture Services ActiveX control can be disabled by setting the kill bit for the following CLSID:
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Will Dormann
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2006-1176 |
Severity Metric: | 2.53 |
Date Public: | 2006-06-21 |
Date First Published: | 2006-07-06 |
Date Last Updated: | 2009-04-13 17:11 UTC |
Document Revision: | 28 |