IBM Lotus Quickr QP2 ActiveX _Times Remote Code Execution VulnerabilityZDI-12-134: August 3rd, 2012
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Quickr. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the QP2.cab ActiveX control. When passing a long string argument to the Attachment_Times or Import_Times parameters during the control's instantiation it is possible to overflow a stack buffer causing memory corruption. This can be leveraged by an attacker to execute code under the context of the user running the browser.
Vendor ResponseIBM has issued an update to correct this vulnerability. More details can be found at:
2011-11-29 - Vulnerability reported to vendor
2012-08-03 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Gaurav Baruah of eSecForte Technologies Pvt. Ltd