---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Chilkat XML ActiveX Component Insecure Methods SECUNIA ADVISORY ID: SA31951 VERIFY ADVISORY: http://secunia.com/advisories/31951/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Chilkat XML ActiveX Component http://secunia.com/advisories/product/19931/ DESCRIPTION: shinnai has discovered some vulnerabilities in Chilkat XML ActiveX Component, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to the ChilkatUtil.CkData.1 (ChilkatUtil.dll) ActiveX control including the insecure "SaveToFile()" and "AppendBinary()" methods. These can be exploited to create arbitrary files or append data to arbitrary files on the system in the context of the currently logged-on user. Successful exploitation allows execution of arbitrary code. The vulnerabilities are confirmed in ChilkatUtil.dll version 3.0.3.0. Other versions may also be affected. SOLUTION: Set the kill-bit for the affected ActiveX controls. PROVIDED AND/OR DISCOVERED BY: shinnai ORIGINAL ADVISORY: http://www.shinnai.net/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1222166972.ff.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------