[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[BMSA-2009-06] Remote code execution in BKAV eOffice



BLUE MOON SECURITY ADVISORY 2009-06
===================================

:Title: Remote code execution in BKAV eOffice
:Severity: Critical
:Reporter: Blue Moon Consulting
:Products: eOffice v5.1.5
:Fixed in: --

Description
-----------

We could not find out the definitive description for eOffice in English. This 
is our own understanding of the application: eOffice is an IMAP email client.

We have discovered a remote code execution vulnerability in eOffice. The 
attacker could force an unknowning user to execute arbitrary code.

To exploit this bug, an attacker only needs to send a specially-crafted email 
to his target's address. When the victim clicks on the email, malicious code 
will run immediately. From there, the attacker might take full control of the 
machine, or simply cause a Denial of Service.

This vulnerability exists in versions up to 5.1.5. Newer version might also be 
affected.

Workaround
----------

Current eOffice users are strongly advised to switch to other email clients 
such as the free Thunderbird, Sylpheed, Outlook Express, or commercial Outlook 
in the MS Office suite until the bug has been resolved.

Fix
---

Customers are advised to contact and request a fix directly from the vendor.

Disclosure
----------

Due to negative response in previous report (`<bmsa200806.html>`_), Blue Moon 
Consulting decided not to report this bug to the vendor but contacted the 
Vietnam Computer Emergency Response Team -- VNCERT.

:Initial contact:

  August 01, 2009: Initial security alert sent to office@xxxxxxxxx, 
vncert@xxxxxxxxxx, vncert@xxxxxxxxxx

:Co-ordinator response:

  August 01, 2009: Operation team replied that it would be the point of contact 
for VNCERT.

:Further communication:

  August 02, 2009: VNCERT requested proof of vulnerability.

  August 02, 2009: Blue Moon Consulting showed and recorded the proof of 
concept exploit.

  August 02, 2009: Blue Moon Consulting sent a draft advisory to VNCERT.

  August 07, 2009: Blue Moon Consulting showed the proof of concept exploit 
under close observation of VNCERT and Ministry of Information and 
Communications.

  August 09, 2009: Nguyen Minh Duc from BKAV requested us to provide technical 
details prior to the emergency meeting called for by VNCERT.

  August 10, 2009: Blue Moon Consulting requested to discuss with BKAV at the 
meeting.

  August 10, 2009: Ministry of Information and Communications held an emergency 
meeting comprising of representatives from the Ministry, VNCERT, VNISA, Blue 
Moon Consulting, and BKAV to verify the vulnerability in an independent 
environment. BKAV refused to attend the meeting.

  August 17, 2009: Nguyen Minh Duc asked Blue Moon Consulting to provide more 
technical information about the vulnerability based on VNCERT's request.

  August 19, 2009: Blue Moon Consulting replied with clear reasons why BKAV had 
voluntarily denied itself from such information. Blue Moon Consulting also 
requested that written request should be made if further assistance was 
required.

  August 24, 2009: Nguyen Minh Duc did not use official communication channel, 
and therefore was ignored.

:Public disclosure:

  September 01, 2009

:Exploit code:

  No exploit code provided.

Disclaimer
----------

The information provided in this advisory is provided "as is" without warranty 
of any kind. Blue Moon Consulting Co., Ltd disclaims all warranties, either 
express or implied, including the warranties of merchantability and fitness for 
a particular purpose. Your use of the information on the advisory or materials 
linked from the advisory is at your own risk. Blue Moon Consulting Co., Ltd 
reserves the right to change or update this notice at any time.


-- 
Nam Nguyen, CISA, CISSP, CSSLP
Blue Moon Consulting Co., Ltd
http://www.bluemoon.com.vn

Attachment: pgpIP9cqK0KWY.pgp
Description: PGP signature