<?xml version="1.0"?>
<?xml-stylesheet href="../fma_report_en.xslt" type="text/xsl" ?>

<advisory xml:space="preserve">
	<meta>
		<description>Realtek Audio Control Panel 1.0.1.65 Local Code Excution</description>
		<keywords>advisory, fuzzing, code execution, exploit, LCE, RTLCPL, RTLCPL.exe</keywords>
	</meta>

	<title>Realtek Audio Control Panel 1.0.1.65 Local Code Excution</title>
	<id>FMA-2010-010</id>

	<application>
		<name>Realtek Audio Control Panel</name>
		<version>1.0.1.65</version>
		<url>http://www.realtek.com</url>
		<files>
			<file>
				<name>RTLCPL.exe</name>
				<version>1.0.1.65</version>
				<md5>C1E3CF28AAA41F1F1E3AA9D110D9447C</md5>
			</file>
		</files>
		<verified>
			<os>
				<name>Windows XP SP3 Home Edition</name>
			</os>
			<os>
				<name>Windows XP SP3 Professional Edition</name>
			</os>
		</verified>
	</application>
	
	<discovery>
		<found>2010.08.24</found>
		<vendor_notified>n/a</vendor_notified>
		<published>2010.11.14</published>
	</discovery>

	<vulnerabilities>
		<vulnerability>
			<name>Local Code Execution in Realtek Audio Control Panel 1.0.1.65</name>
			<type>LCE</type>
			<description>Realtek Audio Control Panel 1.0.1.65 is a module installed with drivers pack for Realtek Audio Card, and is used as a panel for audio configuration. It has buffer overflow vulnerability which is triggered during starting module with extended input arguments.</description>
			<exception>User supplied buffer is copied into a local (on stack) buffer, no boundary check is performed. Too long data overwrites both return address and SEH handler which makes it very easy to run custom code via trusted Realtek application.</exception>
			<images>
				<image>
					<thumbnail>
						<src>image01s.png</src>
						<width>100</width>
						<height>68</height>
					</thumbnail>
					<src>image01.png</src>
					<alt>Data move</alt>
					<text>Data move</text>
				</image>
				<image>
					<thumbnail>
						<src>image02s.png</src>
						<width>100</width>
						<height>68</height>
					</thumbnail>
					<src>image02.png</src>
					<alt>SEH override</alt>
					<text>SEH override</text>
				</image>
				<image>
					<thumbnail>
						<src>image03s.png</src>
						<width>73</width>
						<height>100</height>
					</thumbnail>
					<src>image03.png</src>
					<alt>Version</alt>
					<text>Version</text>
				</image>
				<image>
					<thumbnail>
						<src>image04s.png</src>
						<width>100</width>
						<height>24</height>
					</thumbnail>
					<src>image04.png</src>
					<alt>EIP owned</alt>
					<text>EIP owned</text>
				</image>
				<image>
					<thumbnail>
						<src>image05s.png</src>
						<width>100</width>
						<height>61</height>
					</thumbnail>
					<src>image05.png</src>
					<alt>Crash</alt>
					<text>Crash</text>
				</image>
			</images>
		</vulnerability>	
	</vulnerabilities>
</advisory>