INTERACT FORUM

Please login or register.

Login with username, password and session length
Advanced search  
Pages: [1]   Go Down

Author Topic: Buffer overflow?  (Read 1627 times)

jmp

  • Recent member
  • *
  • Posts: 9
Buffer overflow?
« on: September 11, 2006, 06:18:19 pm »

Bugtraq is reporting a buffer overflow in an old version of Media Center.  They are "not aware of any vendor-supplied patches for this issue", but I don't know why they would post something now on such an old version.  Does anyone here know if the current version resolves these issues?  There is a perl exploit posted, but it is not clear how an attacker would actually get you to execute the code.  Doesn't look like much to worry about, but I was so surprised to see JRiver on the "Weekly Comprehensive List of Newly Discovered Vulnerabilities" - not really a list you want to be on, although you're always in good company there.

http://www.securityfocus.com/bid/19853
Bugtraq ID:  19853 
"J River Media Center Mediacenter.EXE Buffer Overflow Vulnerability

Media Center and various Media Center plugins are prone to a buffer-overflow vulnerability.

This issue occurs because the application fails to bounds-check data before copying it into a finite-sized buffer.

This issue allows remote attackers to cause the application to crash, denying service to the legitimate user. Arbitrary code execution may be possible, but this has not been confirmed.

Version 11.0.309 is vulnerable to this issue; other versions may also be affected."
Logged

JimH

  • Administrator
  • Citizen of the Universe
  • *****
  • Posts: 71382
  • Where did I put my teeth?
Re: Buffer overflow?
« Reply #1 on: September 11, 2006, 06:27:56 pm »

We first heard of this 4 days ago.  We don't believe it is a serious problem. 

This is Bob Brose, replying to my request to investigate:

Quote

Jim Hillegass:
> Bob,
> Can you take a quick look at this?
> http://www.milw0rm.com/exploits/2302
>
[Bob replied]
Since it doesn't look like it can execute arbitrary data on crash it's
just a D.O.S which is embarrassing but not deadly...

Bob
DOS is Denial of Service, meaning the vulnerability could cause someone running a Tivo Server in MC to see a failure to connect, etc.

In order to exploit this reported vulnerability, there would also need to be an opening in the network's firewall.

We're still looking at this.
Logged

John Gateley

  • Citizen of the Universe
  • *****
  • Posts: 4957
  • Nice haircut
Re: Buffer overflow?
« Reply #2 on: September 11, 2006, 10:55:43 pm »

The buffer overflow was fixed quite a long time ago. Updating to the latest version of 11.1 will ensure you are not susceptible.

Thanks, and sorry...

j
Pages: [1]   Go Up