Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:22404
HistorySep 02, 2009 - 12:00 a.m.

[BMSA-2009-06] Remote code execution in BKAV eOffice

2009-09-0200:00:00
vulners.com
7

BLUE MOON SECURITY ADVISORY 2009-06

:Title: Remote code execution in BKAV eOffice
:Severity: Critical
:Reporter: Blue Moon Consulting
:Products: eOffice v5.1.5
:Fixed in: –

Description

We could not find out the definitive description for eOffice in English. This is our own
understanding of the application: eOffice is an IMAP email client.

We have discovered a remote code execution vulnerability in eOffice. The attacker could force an
unknowning user to execute arbitrary code.

To exploit this bug, an attacker only needs to send a specially-crafted email to his target's
address. When the victim clicks on the email, malicious code will run immediately. From there, the
attacker might take full control of the machine, or simply cause a Denial of Service.

This vulnerability exists in versions up to 5.1.5. Newer version might also be affected.

Workaround

Current eOffice users are strongly advised to switch to other email clients such as the free
Thunderbird, Sylpheed, Outlook Express, or commercial Outlook in the MS Office suite until the bug
has been resolved.

Fix

Customers are advised to contact and request a fix directly from the vendor.

Disclosure

Due to negative response in previous report (`<bmsa200806.html>`_), Blue Moon Consulting decided not
to report this bug to the vendor but contacted the Vietnam Computer Emergency Response Team – VNCERT.

:Initial contact:

August 01, 2009: Initial security alert sent to [email protected], [email protected],
[email protected]

:Co-ordinator response:

August 01, 2009: Operation team replied that it would be the point of contact for VNCERT.

:Further communication:

August 02, 2009: VNCERT requested proof of vulnerability.

August 02, 2009: Blue Moon Consulting showed and recorded the proof of concept exploit.

August 02, 2009: Blue Moon Consulting sent a draft advisory to VNCERT.

August 07, 2009: Blue Moon Consulting showed the proof of concept exploit under close observation
of VNCERT and Ministry of Information and Communications.

August 09, 2009: Nguyen Minh Duc from BKAV requested us to provide technical details prior to the
emergency meeting called for by VNCERT.

August 10, 2009: Blue Moon Consulting requested to discuss with BKAV at the meeting.

August 10, 2009: Ministry of Information and Communications held an emergency meeting comprising
of representatives from the Ministry, VNCERT, VNISA, Blue Moon Consulting, and BKAV to verify the
vulnerability in an independent environment. BKAV refused to attend the meeting.

August 17, 2009: Nguyen Minh Duc asked Blue Moon Consulting to provide more technical information
about the vulnerability based on VNCERT's request.

August 19, 2009: Blue Moon Consulting replied with clear reasons why BKAV had voluntarily denied
itself from such information. Blue Moon Consulting also requested that written request should be made
if further assistance was required.

August 24, 2009: Nguyen Minh Duc did not use official communication channel, and therefore was
ignored.

:Public disclosure:

September 01, 2009

:Exploit code:

No exploit code provided.

Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Blue
Moon Consulting Co., Ltd disclaims all warranties, either express or implied, including the
warranties of merchantability and fitness for a particular purpose. Your use of the information on
the advisory or materials linked from the advisory is at your own risk. Blue Moon Consulting Co., Ltd
reserves the right to change or update this notice at any time.


Nam Nguyen, CISA, CISSP, CSSLP
Blue Moon Consulting Co., Ltd
http://www.bluemoon.com.vn