Gracenote CDDBControl ActiveX Proxy Configuration Parameters Multiple Overflows

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is susceptible
to a buffer overflow vulnerability.

Description :

The Windows remote host contains the Gracenote CDDBControl ActiveX
control, which is used by various products, including AOL's software,
to lookup CD information in the Gracenote CDDB and is commonly marked
as safe for scripting.

The version of this ActiveX control on the remote host reportedly
contains a buffer overflow vulnerability that arises when a large
string is supplied as an option for the control. A remote attacker
may be able to leverage this issue to execute arbitrary code on the
remote host subject to the privileges of the current user.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-07-021.html

Solution :

Contact the developer of the software you are using for a patch or
new version; otherwise, use Gracenote's tool to set its kill bit
to disable the control in Internet Explorer.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 25083 (cddbcontrol_activex_overflow2.nasl)

Bugtraq ID: 23567

CVE ID: CVE-2007-0443

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now