[VIM] [Secunia] ERADAS ER Viewer Stack Based Overflow
Secunia Research
vuln at secunia.com
Thu May 23 03:54:50 CDT 2013
Hi James,
We have confirmed two new vulnerabilities in ERDAS ER Viwer and have started
the coordination process on your behalf.
We will let you know when we hear back from the vendor.
Thank you for reporting these issues to us.
--
Kind regards,
Chaitanya Sharma
Advisory Team Lead
Secunia,
Mikado House,
Rued Langgaards Vej 8,
2300 Copenhagen S,
Denmark.
http://www.secunia.com
Phone: +45 7020 5144
Fax: +45 7020 5145
-----Original Message-----
From: Secunia Research [mailto:vuln at secunia.com]
Sent: Tuesday, May 14, 2013 3:48 PM
To: 'James Fitts'
Cc: Vuln at secunia.com
Subject: RE: [Secunia] ERADAS ER Viewer Stack Based Overflow
Hello James,
Apologies for not responding earlier. Thank you for reporting this issue to
us. We tested the vulnerability report on the latest version of Erdas ER
Viewer and after quick review it appears that the vulnerability you
reported is a distinct vulnerability than described in CVE-2013-0726. It
could also be a new vector for the vulnerability which the vendor failed to
fix properly (the patch is currently available a restricted audience only).
We will investigate this further and keep you updated with the progress.
Thank you for your patience.
--
Kind regards,
Chaitanya Sharma
Advisory Team Lead
Secunia,
Mikado House,
Rued Langgaards Vej 8,
2300 Copenhagen S,
Denmark.
http://www.secunia.com
Phone: +45 7020 5144
Fax: +45 7020 5145
-----Original Message-----
From: James Fitts [mailto:fitts.james at gmail.com]
Sent: Thursday, May 09, 2013 1:52 AM
To: Secunia Research
Subject: Re: [Secunia] ERADAS ER Viewer Stack Based Overflow
Heh, it looks like my module exploits the vulnerability found in
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0726
If you send a file with just a long string of A's and nothing else, you can
crash the application in rf_report_error()
.text:100762D0 mov cl, [eax]
.text:100762D2 mov [esi+eax], cl
.text:100762D5 inc edx
.text:100762D6 inc eax
.text:100762D7 cmp cl, 0Ah
.text:100762DA jz short loc_100762E8
.text:100762DC cmp edx, 0C7h
.text:100762E2 jge short loc_100762E8
.text:100762E4 cmp eax, edi
.text:100762E6 jb short loc_100762D0
ermapper_u.dll, a bit interesting.
On Wed, May 8, 2013 at 4:02 AM, Secunia Research <vuln at secunia.com> wrote:
Hello James,
This is to acknowledge that we have received your report. We will
get back
to you when we have finished our analysis.
Thank you and kind regards,
Lars Wiebusch
---
Med venlig hilsen / Kind Regards,
Lars Wiebusch
Security Specialist
Secunia
Mikado House
Rued Langgaardsvej 8
2300 Copenhagen S
Denmark
Phone +45 7020 5144 <tel:%2B45%207020%205144>
Fax +45 7020 5145 <tel:%2B45%207020%205145>
Please visit our corporate website:
http://www.secunia.com
Follow us on Twitter:
http://twitter.com/secunia
More information about the VIM
mailing list