Some vulnerabilities have been discovered in Friendly Technologies fwDialerTechTool.dll ActiveX control, which can be exploited by malicious people to disclose sensitive information and compromise a user's system.
1) A boundary error exists within the "CreateURLShortcut()" method when handling an overly long parameter. This can be exploited to cause a buffer overflow when a user e.g. visits a malicious website.
Successful exploitation allows execution of arbitrary code.
2) The ActiveX control contains the insecure method "RunApp()", which allows launching of arbitrary applications with parameters when a user e.g. visits a malicious website.
3) The ActiveX control contains the insecure method "RegistryValue()", which allows reading and writing arbitrary registry keys when a user e.g. visits a malicious website.
The vulnerabilities are confirmed in version 220.127.116.11 of the ActiveX control as included with FriendlyPPPoE version 18.104.22.168. Other versions may also be affected.
Solution: Set the kill-bit for the affected ActiveX control.
Provided and/or discovered by: spdr
Original Advisory: http://milw0rm.com/exploits/6323
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com