AOH :: HP Unsorted M :: VA3428.HTM

Microchip MPLAB IDE Buffer Overflow Vulnerability



Microchip MPLAB IDE Buffer Overflow Vulnerability
Microchip MPLAB IDE Buffer Overflow Vulnerability



Microchip MPLAB IDE Buffer Overflow Vulnerability

1. General Information

MPLAB IDE is a famous Integrated Development Environment (IDE) of 
Microchip (www.microchip.com) that provides a single integrated 
environment to develop applications for Microchip microcontrollers and 
digital signal controllers.

In March 2009, Bkis has just detected a vulnerability in this software. 
This vulnerability arises from the way MPLAB IDE processes IDE Project 
files with extension of .mcp. It could lead to a critical buffer 
overflow error that allows hackers to execute malicious code on users=92 
systems. We have submitted to vendor.

Details : http://security.bkis.vn/?p=654 
Bkis Advisory : Bkis-08-2009.
Initial vendor notification : 15/03/2009
Release Date : 11/05/2009
Update Date : 11/05/2009
Discovered by : Le Duc Anh, Bkis.
Attack Type : Buffer Overflow.
Security Rating : High.
Impact : Code Execution.
Affected Software : Microchip MPLAB IDE 8.30 (Prior versions may also be 
affected).
PoC : http://security.bkis.vn/wp-content/uploads/2009/05/mplap_ide_poc.zip 


2. Technical Description

MCP files are used to store essential information about a MPLAB IDE 
Project (in plain text). The software has not handled the file format 
well enough resulting in a critical security issue. Many fields in this 
file format might create buffer overflow error when set with an overly 
long value such as: [FILE_INFO], [CAT_FILTERS] =85.

In order to exploit, a hacker might create a specially crafted .mcp file 
and trick users into using it. If successful, hackers can perform local 
attack, inject viruses, steal sensitive information and even take 
control of the victim=92s system.

3. Solution

The vendor hasn=92t fixed this vulnerability yet. Therefore, Bkis 
recommends that users be cautious with MPLAB IDE Project source from 
untrustworthy sources until the vendor release the patch.

Bkis (http://security.bkis.vn) 



The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.