Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows - Nessus

High   Plugin ID: 38734

This page contains detailed information about the Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 38734
Name: Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows
Filename: whale_client_activex_3_7_sp2_overflows.nasl
Vulnerability Published: N/A
This Plugin Published: 2009-05-11
Last Modification Time: 2018-08-06
Plugin Version: 1.10
Plugin Type: local
Plugin Family: Windows
Dependencies: smb_hotfixes.nasl
Required KB Items [?]: SMB/Registry/Enumerated

Vulnerability Information


Severity: High
Vulnerability Published: N/A
Patch Published: N/A
CVE [?]: CVE-2007-2238
CPE [?]: N/A

Synopsis

The remote Windows host has an ActiveX control that is affected by multiple buffer overflows.

Description

The version of the Whale Client Components ActiveX control, a component of Microsoft Whale Intelligent Application Gateway product and installed on the remote Windows host, reportedly contains multiple stack-based buffer overflows that can be triggered using long arguments to the 'CheckForUpdates' and 'UpdateComponents' methods. If an attacker can trick a user on the affected host into viewing a specially crafted HTML document, he can leverage these issues to execute arbitrary code on the affected system subject to the user's privileges.

Solution

Upgrade to Microsoft Intelligent Application Gateway 3.7 SP2 or later.

Public Exploits


Target Network Port(s): 139, 445
Target Asset(s): N/A
Exploit Available: True (Metasploit Framework, Exploit-DB, Immunity Canvas)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows vulnerability:

  1. Metasploit: exploit/windows/browser/mswhale_checkforupdates
    [Microsoft Whale Intelligent Application Gateway ActiveX Control Buffer Overflow]
  2. Exploit-DB: exploits/windows/remote/16608.rb
    [EDB-16608: Microsoft Whale Intelligent Application Gateway - ActiveX Control Buffer Overflow (Metasploit)]
  3. Immunity Canvas: D2ExploitPack

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS V2 Vector [?]: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVSS Base Score:9.3 (High)
Impact Subscore:10.0
Exploitability Subscore:8.6
CVSS Temporal Score:7.7 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:7.7 (High)

Go back to menu.

Plugin Source


This is the whale_client_activex_3_7_sp2_overflows.nasl nessus plugin source code. This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(38734);
  script_version("1.10");
  script_cvs_date("Date: 2018/08/06 14:03:16");

  script_cve_id("CVE-2007-2238");
  script_bugtraq_id(34532);
  script_xref(name:"CERT", value:"789121");
  script_xref(name:"Secunia", value:"34725");

  script_name(english:"Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows");
  script_summary(english:"Checks version of control");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an ActiveX control that is affected by
multiple buffer overflows.");
  script_set_attribute(attribute:"description", value:
"The version of the Whale Client Components ActiveX control, a component
of Microsoft Whale Intelligent Application Gateway product and installed
on the remote Windows host, reportedly contains multiple stack-based
buffer overflows that can be triggered using long arguments to the
'CheckForUpdates' and 'UpdateComponents' methods.  If an attacker can
trick a user on the affected host into viewing a specially crafted HTML
document, he can leverage these issues to execute arbitrary code on the
affected system subject to the user's privileges.");
  script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/library/dd282918.aspx");
  script_set_attribute(attribute:"solution", value:"Upgrade to Microsoft Intelligent Application Gateway 3.7 SP2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Microsoft Whale Intelligent Application Gateway ActiveX Control Buffer Overflow');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
  script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
  script_cwe_id(119);

  script_set_attribute(attribute:"plugin_publication_date", value:"2009/05/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


include("global_settings.inc");
include("smb_func.inc");
include("smb_activex_func.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);


# Locate the file used by the controls.
if (activex_init() != ACX_OK) exit(0);

clsid = '{8D9563A9-8D5F-459B-87F2-BA842255CB9A}';
file = activex_get_filename(clsid:clsid);
if (file)
{
  version = activex_get_fileversion(clsid:clsid);

  if (version && activex_check_fileversion(clsid:clsid, fix:"3.7") == TRUE)
  {
    report = NULL;
    if (report_paranoia > 1)
      report = string(
        "\n",
        "Version ", version, " of the vulnerable control is installed as :\n",
        "\n",
        "  ", file, "\n",
        "\n",
        "Note, though, that Nessus did not check whether the kill bit was\n",
        "set for the control's CLSID because of the Report Paranoia setting\n",
        "in effect when this scan was run.\n"
      );
    else if (activex_get_killbit(clsid:clsid) == 0)
      report = string(
        "\n",
        "Version ", version, " of the vulnerable control is installed as :\n",
        "\n",
        "  ", file, "\n",
        "\n",
        "Moreover, its kill bit is not set so it is accessible via Internet\n",
        "Explorer.\n"
      );
    if (report)
    {
      if (report_verbosity > 0) security_hole(port:kb_smb_transport(), extra:report);
      else security_hole(kb_smb_transport());
    }
  }
}
activex_end();

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/whale_client_activex_3_7_sp2_overflows.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\whale_client_activex_3_7_sp2_overflows.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/whale_client_activex_3_7_sp2_overflows.nasl

Go back to menu.

How to Run


Here is how to run the Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Windows plugin family.
  6. On the right side table select Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows plugin ID 38734.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl whale_client_activex_3_7_sp2_overflows.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a whale_client_activex_3_7_sp2_overflows.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - whale_client_activex_3_7_sp2_overflows.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state whale_client_activex_3_7_sp2_overflows.nasl -t <IP/HOST>

Go back to menu.

References


BID | SecurityFocus Bugtraq ID: CERT | Computer Emergency Response Team: Secunia Advisory: CWE | Common Weakness Enumeration:
  • CWE-119 (Weakness) Improper Restriction of Operations within the Bounds of a Memory Buffer
See also: Similar and related Nessus plugins:
  • 148693 - Microsoft Edge (Chromium) < 90.0.818.39 Multiple Vulnerabilities
  • 148939 - Microsoft Edge (Chromium) < 90.0.818.46 Multiple Vulnerabilities
  • 149388 - Microsoft Windows Web Media Extensions Library RCE (May 2021)
  • 149476 - Microsoft Edge (Chromium) < 90.0.xxxxxx Multiple Vulnerabilities
  • 150721 - Microsoft Edge (Chromium) < 91.0.864.48 Multiple Vulnerabilities
  • 152004 - Microsoft Edge (Chromium) < 92.0.902.55 Multiple Vulnerabilities
  • 152102 - Microsoft Windows EFSRPC NTLM Reflection Elevation of Privilege (PetitPotam) (Remote)
  • 152458 - Microsoft Exchange Server RCE (ProxyShell)
  • 153369 - Microsoft Edge (Chromium) < 93.0.961.47 Vulnerability
  • 153995 - Microsoft Edge (Chromium) < 94.0.992.47 Multiple Vulnerabilities
  • 154327 - Microsoft Edge (Chromium) < 95.0.1020.30 Multiple Vulnerabilities
  • 154738 - Microsoft Edge (Chromium) < 95.0.1020.40 Multiple Vulnerabilities
  • 155601 - Microsoft Edge (Chromium) < 93.0.961.38 Multiple Vulnerabilities
  • 159239 - Microsoft Edge (Chromium) < 99.0.1150.55 Vulnerability
  • 18405 - Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness
  • 26918 - Microsoft Windows SMB Blank Administrator Password
  • 26919 - Microsoft Windows SMB Guest Account Local User Access
  • 63155 - Microsoft Windows Unquoted Service Path Enumeration
  • 80333 - Microsoft Visual Studio .gitconfig Command Execution

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file whale_client_activex_3_7_sp2_overflows.nasl version 1.10. For more plugins, visit the Nessus Plugin Library.

Go back to menu.