Remote Buffer Overflow Vulnerability in Samsung Kies
|Tested Version:||22.214.171.12414_1 on Windows 7 SP1 and Internet Explorer 9.0|
|Advisory Publication:||December 19, 2012 [without technical details]|
|Vendor Notification:||December 19, 2012|
|Vendor Fix:||December 27, 2012|
|Public Disclosure:||January 9, 2013|
|Latest Update:||December 27, 2012|
|Vulnerability Type:||Buffer Errors [CWE-119]|
|CVSSv2 Base Score:||9.3 (AV:N/AC:H/Au:N/C:C/I:C/A:C)|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab has discovered buffer overflow vulnerability in Samsung Kies, which can be exploited to execute arbitrary code on vulnerable system.
|Vulnerability is fixed by vendor in version 126.96.36.19923_2_7|
Download it at http://www.samsung.com/kies
| High-Tech Bridge Advisory HTB23136 - https://www.immuniweb.com/advisory/HTB23136 - Remote Buffer Overflow Vulnerability in Samsung Kies|
 Samsung Kies - http://www.samsung.com/ca/support/usefulsoftware/KIES/JSP - Samsung Kies is a freeware software application used to communicate between Windows or Macintosh computers, and more recently-manufactured Samsung mobile phone and tablet computer devices. Kies is Samsung's official tool for Android based devices which allow synchronization and multimedia files management.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
HTB23063: 2 Buffer Overflows in Wireless Manager Sony VAIO
HTB23044: Buffer Overflow in HP Device Access Manager for Protect Tools Information Store
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.