Microsoft Internet Explorer Install Engine Control Buffer Ov

Microsoft Internet Explorer Install Engine Control Buffer Ov

  • Peca  Male
  • Glavni Administrator
  • Predrag Damnjanović
  • SysAdmin i programer
  • Pridružio: 17 Apr 2003
  • Poruke: 23099
  • Gde živiš: Niš

NGSSoftware Insight Security Research Advisory

Name: Microsoft Internet Explorer Install Engine Control Buffer Overflow
Systems Affected: Microsoft Internet Explorer 5.x/6.x
Severity: High
Vendor URL:
Author: Peter Winter-Smith [ ]
Date of Public Advisory: 19th January 2004
Advisory number: #NISR19012005a
Advisory URL:


All versions of Microsoft Windows, with Microsoft Internet Explorer, come
packaged with the Microsoft Active Setup/Install Engine components. These
components are marked as safe for scripting and can be invoked by default
from any basic web-page.

The Install Engine control has been found to be vulnerable to an integer
overflow, leading to a heap based buffer overflow which could allow an
attacker to run arbitrary code on a vulnerable system through a specially
crafted web-page or through a specially crafted HTML email if scripting is


When calling the SetCifFile() method provided by the Active Setup Controls
ActiveX component 'asctrls.ocx', if the first parameter (the '.cab' file
name) is a string of a length in excess of about 2kb, an integer overflow
occurs when attempting to calculate the buffer space allowed for copying
the base url.

The vulnerable code path will only be executed if the 'BaseURL' property
has previously been set. The value stored as this property is the first
string which can be made to overflow the heap.

After the base url is copied into the buffer, the string which we have
provided as the cab file name is concatenated onto the end of our buffer
without any length checking, making it the second string which can
overflow the heap.

The vulnerable code is located within the Install Engine Control module
('inseng.dll') which is provided with the Active Setup Controls component,
both of which can be found in the 'System32' folder in the Windows

The vulnerable code can be seen below:

MOV EBX,DWORD PTR DS:[<&KERNEL32.lstrcpynA>] ; kernel32.lstrcpynA()


PUSH DWORD PTR SS:[EBP+C] ; /String = Cab file name
CALL DWORD PTR DS:[<&KERNEL32.lstrlenA>] ; \lstrlenA()

MOV ECX,822 ; Max buffer size
SUB ECX,EAX ; Calculate remaining buffer space - integer overflow!

PUSH ECX ; /n = Unchecked value - remaining buffer space!
PUSH DWORD PTR SS:[EBP-8] ; |String2 = BaseURL property value
PUSH ESI ; |String1 = 0x822 bytes heap buffer
CALL EBX ; \lstrcpynA()

MOV EDI,DWORD PTR DS:[<&KERNEL32.lstrcatA>] ; kernel32.lstrcatA()
PUSH inseng.66561C84 ; /StringToAdd = "/"
PUSH ESI ; |ConcatString = Our heap buffer
CALL EDI ; \lstrcatA()

PUSH DWORD PTR SS:[EBP+C] ; /StringToAdd = Our Cab file name
PUSH ESI ; |ConcatString = Our heap buffer
CALL EDI ; \lstrcatA()

Fix Information

Microsoft have released an update for Microsoft Internet Explorer which is
set to address this issue. This can be downloaded from:

A check for this vulnerability has been added to Typhon III, NGSSoftware's
advanced vulnerability assessment scanner. For more information please
visit the NGSSoftware website at

Registruj se da bi učestvovao u diskusiji. Registrovanim korisnicima se NE prikazuju reklame unutar poruka.
Ko je trenutno na forumu

Ukupno su 602 korisnika na forumu :: 36 registrovanih, 5 sakrivenih i 561 gosta   ::   [ Administrator ] [ Supermoderator ] [ Moderator ] :: Detaljnije

Najviše korisnika na forumu ikad bilo je 3028 - dana 22 Nov 2019 07:47

Korisnici koji su trenutno na forumu:
Korisnici trenutno na forumu: 8u47, A.R.Chafee.Jr., Atomski čoban, baza, BlackPhantom, Bloody, Cvijo_ue, Dany6, Drug pukovnik, Dusan Medojevic, ekser222, Gargantua2, goxin, gzoki, ivan979, Lošmi, majorgaspar, MarKhan, Marko Marković2, Milan A. Nikolic, nemkea71, novator, pein, RJ, sabros, Sirius, Srna2, stalker, stug, Toni, trajkoni018, vathra, wizzardone, XBMC, yrraf, zoranis