Secunia Research: Dell DellSystemLite.Scanner ActiveX Control "GetData()" Directory Traversal

====================================================================== 

                     Secunia Research 18/02/2011

           - Dell DellSystemLite.Scanner ActiveX Control -
                - "GetData()" Directory Traversal -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

* Dell DellSystemLite.Scanner ActiveX Control 1.0.0.0.

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Less critical
Impact: Exposure of sensitive information.
Where:  Remote

====================================================================== 
3) Vendor's Description of Software 

"Scan a computer to collect its Service Tag. Define which drivers and
utility software programs are appropriate for your product."

Product Link:
http://support.dell.com/

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in Dell
DellSystemLite.Scanner ActiveX control, which can be exploited by
malicious people disclose potentially sensitive information.

The vulnerability is caused by an input validation error in the
"GetData()" method. This can be exploited to disclose the contents of 
arbitrary text files via directory traversal specifiers passed in the 
"fileID" parameter.

====================================================================== 
5) Solution 

Set the kill-bit for the affected ActiveX control.

====================================================================== 
6) Time Table 

26/01/2011 - Requested security contact.
02/02/2011 - Requested security contact.
18/02/2011 - Public disclosure.

====================================================================== 
7) Credits 

Discovered by Dmitriy Pletnev, Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2011-0329 for the vulnerability.

====================================================================== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2011-10/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================