[Japanese]

JVNDB-2015-000127

ELPhoneBtnV6 ActiveX control vulnerable to buffer overflow

Overview

ELPhoneBtnV6 ActiveX control was used for "Click to Live" service provided by FreeBit Co., Ltd. Although "Click to Live" service has been discontinued, PCs that used the "Click to Live" service may still have the ActiveX control installed.

ELPhoneBtnV6 ActiveX control, which is provided by the file c2lv6.ocx, contains a buffer overflow vulnerability in the ExecCall() method.

Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
Affected Products


FreeBit Co., Ltd.
  • ELPhoneBtnV6 ActiveX control

Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Solution

[Delete the ELPhoneBtnV6]
"Click to Live" service has been discontinued. It is recommended to delete the ELPhoneBtnV6 ActiveX Control.
Vendor Information

FreeBit Co., Ltd.
CWE (What is CWE?)

  1. Buffer Errors(CWE-119) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2015-5624
References

  1. JVN : JVN#62078684
  2. National Vulnerability Database (NVD) : CVE-2015-5624
Revision History

  • [2015/09/07]
      Web page was published
    [2015/09/09]
      References : Content was added