Mobipocket Reader CHM File Handling Remote Overflow

high Nessus Plugin ID 59108

Synopsis

The remote Windows host contains an eBook reader that is affected by a buffer overflow vulnerability.

Description

All versions of Mobipocket Reader are potentially affected by a stack-based buffer overflow vulnerability.

The application does not properly validate user input and can allow crafted 'CHM' files to either crash the application or execute arbitrary code if an attack is successful.

Note that Mobipocket Reader is no longer supported which implies no new security patches will be released.

Solution

Remove the software as it is no longer supported.

See Also

http://shinnai.altervista.org/exploits/SH-018-20120423.html

https://seclists.org/fulldisclosure/2012/Apr/255

http://www.mobipocket.com/en/DownloadSoft/default.asp

Plugin Details

Severity: High

ID: 59108

File Name: mobipocket_reader_chm_bufferoverflow.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 5/16/2012

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/a:amazon:mobipocket_reader

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 4/23/2012

Reference Information

BID: 53200