by Tan Chew Keong
Release Date: 2008-04-25
A security issue and a vulnerability have been found in HP HPeDiag ActiveX Controls. When exploited, the security issue and vulnerability allow the disclosure of system information and execution of arbitrary code when the user views a malicious website. These ActiveX controls are installed as part of HP Software Update version 126.96.36.1991 when the user installs the Windows software suite for HP color LaserJet 2820/2840.
- HP HPeDiag ActiveX Controls (HPeDiag.dll version 188.8.131.52) included in HP Software Update version 184.108.40.2061 as part of Windows software suite (version 2.0b - 5 Dec 2005) for HP color LaserJet 2820/2840.
Installing HP SoftPaq SP38202 does not resolve the issue since it disables only the HPRulesEngine.ContentCollection.1 control.
This advisory discloses a security issue and a vulnerability in HP HPeDiag ActiveX Controls. These ActiveX controls are installed as part of HP Software Update version 220.127.116.111 when the user installs the Windows software suite for HP color LaserJet 2820/2840.
Successful exploit requires that the user is tricked into visiting a malicious website using IE6 or earlier. If the user uses IE7, he must first be convinced into allowing the ActiveX control to run.
The buffer overflow occurs within the GetXmlFromIni method of the HPeSupportDiags.HPIniFileUtil.1 ActiveX control when creating XML output from an INI input file. This control is marked "safe-for-scripting" and hence, can be invoked from Internet Explorer. In this method, each Section name that is read from the INI input file is used in an unsafe sprintf() call to construct the XML output. This causes a stack-based buffer when the Section name is overly long.
To exploit this vulnerability, the attacker must be able to create a webpage that uses the GetXmlFromIni method to process an INI file that is accessible by the victim. By placing the malicious INI on a publicly accessible Windows shared folder, it is possible for the attacker to trigger this buffer overflow without having to first place the INI file on the victim's system.
The ActiveX control is compiled with VC++ stack-based buffer overflow protection. However, in this case, the vulnerability is still exploitable since it is possible to overwrite the saved SEH. When the buffer overflow happens, a write-access exception is triggered that passes control to the overwritten SEH before the function returns. By spraying the IE heap with shellcode and overwriting the SEH with an address that points into the IE heap, a reliable exploit can be achived.
The vulnerable code exists in HPeDiag.dll version 18.104.22.168.
The Ollydbg screen capture below shows that the vulnerability can be used to control EIP by overwriting the saved SEH.
Several other ActiveX controls are marked "safe-for-scripting". This can be used by a malicious website to gather system information. Examples of these ActiveX controls include the following. NOTE: This is not an exhaustive list. Please set the kill-bit on all unnecessary controls.
- HPeSupportDiags.HPRegUtil.1 (0C378864-D5C4-4D9C-854C-432E3BEC9CCB)
- Read user's registry keys.
- HPeSupportDiags.HPFileUtil.1 (CDAF9CEC-F3EC-4B22-ABA3-9726713560F8)
- Read text files on user's system.
- HPeSupportDiags.HPSystemBoardInfo.1 (AB237044-8A3B-42BB-9EE1-9BFA6721D9ED)
- HPeSupportDiags.HPOperatingSystem.1 (784F2933-6BDD-4E5F-B1BA-A8D99B603649)
- Read Windows OS information.
POC / Test Code
POC HTML files have been provided to the vendor to reproduce the issue.
- Host the POC files on a web server.
- Install the Windows software suite (version 2.0b - 5 Dec 2005) for HP color LaserJet 2820/2840 on a Windows system with IE6 (Choose Typical installation).
- Once the software is installed, access the POC files using IE6.
Patch / Workaround
Update to HP Software Update version 4.000.010.008 or later using HP Software Update. See release notes. Vendor advisory is here.
2008-03-15 - Vulnerability Discovered.
2008-03-17 - Initial Vendor Notification.
2008-03-17 - Initial Vendor Reply.
2008-04-15 - Vendor Reminder Sent.
2008-04-16 - Received reply that vulnerability can be resolved by updating to HP Software Update version 4.000.010.008.
2008-04-24 - Vendor Releases Advisory.
2008-04-25 - Public Release.