---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Autodesk Design Review DWF Viewer ActiveX Control "SaveAs()" Insecure Method SECUNIA ADVISORY ID: SA31989 VERIFY ADVISORY: http://secunia.com/advisories/31989/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Autodesk Design Review 9.x http://secunia.com/advisories/product/18350/ DESCRIPTION: bruiser has discovered a vulnerability in Autodesk Design Review, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the AdView.AdViewer.1 ActiveX control (AdView.dll) including the insecure "SaveAs()" method. This can be exploited to overwrite arbitrary files on the system in the context of the currently logged-on user. Successful exploitation allows execution of arbitrary code. The vulnerability is confirmed in AdView.dll version 9.1.0.127 included in Autodesk Design Review 2009 Service Pack 1. Other versions may also be affected. SOLUTION: Set the kill-bit for the affected ActiveX control. PROVIDED AND/OR DISCOVERED BY: bruiser, Nine Situations Group ORIGINAL ADVISORY: http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------