
SonicWALL UTM Research team is tracking a new 0-day exploit within the msVidCtl component of Microsoft DirectShow that is actively being exploited through drive-by attacks using thousands of newly compromised web sites.
Microsoft DirectShow is a multimedia framework and API; it is the replacement for Microsoft's earlier "Video for Windows" technology. DirectShow provides a common interface for media across many programming languages, and is an extensible, filter-based framework that can render or record media files on demand.
Microsoft DirectShow exposes a number of ActiveX controls for developers. The binary code of these ActiveX controls are encapsulated in dynamic link library msvidctl.dll. These ActiveX controls were not intended to be exposed for the purposes of web development, however, a user can force to load it in an HTML document.
A stack buffer overflow vulnerability exists in ProgramID "BDATuner.MPEG2TuneRequest" and ClassID "0955AC62-BF2E-4CBA-A2B9-A63F772D46CF", which is hosted by msvidctl.dll. Specifically, the application extracts a 4-byte integer value at file offset 0x06 of a GIF image; the application then uses it as the Data Size to copy file data to a stack buffer without performing boundary checks. Opening a specially crafted GIF file in the ActiveX control will overflow the stack buffer, potentially ovewriting critical process data such as function return addresses and SEH pointers.
Remote attackers could exploit this vulnerability by enticing a target user to visit a maliciously crafted webpage. Successful exploitation would lead to arbitrary code execution in the security context of the logged in user, or terminate the application resulting in a Denial of Service condition. The other CLSIDs and ProgramIDs that are hosted by library msvidctl.dll might be vulnerable as well.
SonicWALL has released several GAV and IPS signatures to detect and prevent specific exploitation attempts targeting this vulnerability. The signatures are listed bellow:
GAV:
IPS:
Some of the domains that are exploiting the new IE-0day as well as secondary domains that are hosting potentially malicious binaries utilized in these attacks are listed below. DO NOT VISIT THEM!
See Internet Stom Center blog entry for up-to-date list.
Share This Article

An Article By
An Article By
Security News
Security News