<?xml version="1.0"?>
<?xml-stylesheet href="../fma_report_en.xslt" type="text/xsl" ?>

<advisory xml:space="preserve">
	<meta>
		<description>Realtek HD Audio Control Panel 2.1.3.2 Local Code Excution</description>
		<keywords>advisory, fuzzing, code execution, exploit, LCE, RTHDCPL.exe, RTHDCPL</keywords>
	</meta>

	<title>Realtek HD Audio Control Panel 2.1.3.2 Local Code Excution</title>
	<id>FMA-2010-012</id>
	
	<application>
		<name>Realtek HD Audio Control Panel</name>
		<version>2.1.3.2</version>
		<url>http://www.realtek.com</url>
		<files>
			<file>
				<name>RTHDCPL.exe</name>
				<version>2.1.3.2</version>
				<md5>0F37BA18845A56347B66D290EBFDEBCA</md5>
			</file>
		</files>
		<verified>
			<os>
				<name>Windows XP SP3 Home Edition</name>
			</os>
			<os>
				<name>Windows XP SP3 Professional Edition</name>
			</os>
		</verified>
	</application>
	
	<discovery>
		<found>2010.08.24</found>
		<vendor_notified>n/a</vendor_notified>
		<published>2010.11.14</published>
	</discovery>

	<vulnerabilities>
		<vulnerability>
			<name>Local Code Execution in Realtek HD Audio Control Panel 2.1.3.2</name>
			<type>LCE</type>
			<description>Realtek HD Audio Control Panel 2.1.3.2 is module installed with drivers pack for Realtek Audio Card, and is used as a panel for audio configuration. It has buffer overflow vulnerability which is triggered during starting module with extended input arguments.</description>
			<exception>User supplied buffer is copied into a local (on stack) buffer, no boundary check is performed. Too long data overwrites both return address and SEH handler which makes it very easy to run custom code via trusted Realtek application.</exception>
			<images>
				<image>
					<thumbnail>
						<src>image01s.png</src>
						<width>100</width>
						<height>58</height>
					</thumbnail>
					<src>image01.png</src>
					<alt>Data move</alt>
					<text>Data move</text>
				</image>
				<image>
					<thumbnail>
						<src>image02s.png</src>
						<width>100</width>
						<height>58</height>
					</thumbnail>
					<src>image02.png</src>
					<alt>SEH override</alt>
					<text>SEH override</text>
				</image>
				<image>
					<thumbnail>
						<src>image03s.png</src>
						<width>100</width>
						<height>75</height>
					</thumbnail>
					<src>image03.png</src>
					<alt>Application</alt>
					<text>Application</text>
				</image>
				<image>
					<thumbnail>
						<src>image04s.png</src>
						<width>100</width>
						<height>24</height>
					</thumbnail>
					<src>image04.png</src>
					<alt>EIP owned</alt>
					<text>EIP owned</text>
				</image>
			</images>
		</vulnerability>	
	</vulnerabilities>
</advisory>