|Main Archive Page > Month Archives > full-disclosure-uk archives|
NOTE: Other versions may also be affected.
Rating: Highly critical
Impact: System compromise
"TSC2 Help Desk from is full-featured, easy to use help desk software that will help you manage your support issues and assets.".
Secunia Research has discovered a vulnerability in TSC2 Help Desk, which can be exploited by malicious people to potentially compromise a user's system.
The vulnerability is caused due to a boundary error in the included CTab ActiveX control (c1sizer.ocx) when copying tab captions. This can be exploited to cause a heap-based buffer overflow by e.g. adding multiple tabs via the "AddTab()" method.
Successful exploitation may allow execution of arbitrary code.
Set the kill-bit for the affected ActiveX control.
13/11/2008 - Vendor notified.
07/01/2009 - Public disclosure.
Discovered by Carsten Eiram, Secunia Research.
The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-4827 for the vulnerability.
Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:
Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.
Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:
Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:
Secunia offers a FREE mailing list called Secunia Security Advisories:
Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-54/
Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/