D-Link DCS-5605 Network Surveillance DcsCliCtrl.dll ActiveX Control SelectDirectory() Method Buffer Overflow

high Nessus Plugin ID 58591

Synopsis

The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.

Description

The remote host has the D-Link DCS-5605 Network Surveillance DcsCliCtrl.dll ActiveX control installed. This control fails to properly parse data supplied to the 'SelectDirectory()' function due to an unsafe call to 'lstrcpyW()', which can lead to a stack buffer overflow.

By tricking a user into opening a specially crafted web page, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the user's privileges.

Solution

Remove or disable the control as fixes are not available.

See Also

http://www.nessus.org/u?b546d0f4

Plugin Details

Severity: High

ID: 58591

File Name: dlink_dcs5605_activex_bof.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 4/4/2012

Updated: 7/10/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/28/2012

Vulnerability Publication Date: 3/28/2012

Reference Information

CVE: CVE-2012-5306

BID: 52769