<?xml version="1.0"?>
<?xml-stylesheet href="../fma_report_en.xslt" type="text/xsl" ?>

<advisory xml:space="preserve">
	<meta>
		<description>Realtek Audio Microphone Calibration 1.1.1.6 Local Code Excution</description>
		<keywords>advisory, fuzzing, code execution, exploit, LCE, MicCal, MicCal.exe</keywords>
	</meta>

	<title>Realtek Audio Microphone Calibration 1.1.1.6 Local Code Excution</title>
	<id>FMA-2010-011</id>
	
	<application>
		<name>Realtek Audio Microphone Calibration</name>
		<version>1.1.1.6</version>
		<url>http://www.realtek.com</url>
		<files>
			<file>
				<name>MicCal.exe</name>
				<version>1.1.1.6</version>
				<md5>D3FB45B90F195FE86D9949A4B62CBBD6</md5>
			</file>
		</files>
		<verified>
			<os>
				<name>Windows XP SP3 Home Edition</name>
			</os>
			<os>
				<name>Windows XP SP3 Professional Edition</name>
			</os>
		</verified>
	</application>

	<discovery>
		<found>2010.08.24</found>
		<vendor_notified>n/a</vendor_notified>
		<published>2010.11.14</published>
	</discovery>

	<vulnerabilities>
		<vulnerability>
			<name>Local Code Execution in Realtek Audio Microphone Calibration 1.1.1.6</name>
			<type>LCE</type>
			<description>Realtek Audio Microphone Calibration 1.1.1.6 is module installed with drivers pack for Realtek Audio Card, and is used for microphone calibration. It has buffer overflow vulnerability which is triggered during starting module with extended input arguments.</description>
			<exception>User supplied buffer is copied into a local (on stack) buffer, no boundary check is performed. Too long data overwrites both return address and SEH handler which makes it very easy to run custom code via trusted Realtek application.</exception>
			<images>
				<image>
					<thumbnail>
						<src>image01s.png</src>
						<width>100</width>
						<height>58</height>
					</thumbnail>
					<src>image01.png</src>
					<alt>Data move</alt>
					<text>Data move</text>
				</image>
				<image>
					<thumbnail>
						<src>image02s.png</src>
						<width>100</width>
						<height>58</height>
					</thumbnail>
					<src>image02.png</src>
					<alt>SEH override</alt>
					<text>SEH override</text>
				</image>
				<image>
					<thumbnail>
						<src>image03s.png</src>
						<width>100</width>
						<height>74</height>
					</thumbnail>
					<src>image03.png</src>
					<alt>Application</alt>
					<text>Application</text>
				</image>
				<image>
					<thumbnail>
						<src>image04s.png</src>
						<width>100</width>
						<height>24</height>
					</thumbnail>
					<src>image04.png</src>
					<alt>EIP owned</alt>
					<text>EIP owned</text>
				</image>
			</images>
		</vulnerability>	
	</vulnerabilities>
</advisory>