what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Essential PIM 4.22 Outdated Libraries

Essential PIM 4.22 Outdated Libraries
Posted Jun 17, 2011
Authored by Stefan Kanthak

Essential PIM version 4.22 is shipping with multiple outdated and vulnerable libraries.

tags | advisory
SHA-256 | 1c8068f330cbf75f9c18acb0f6c9b09b5389bace36fd4ae4a08117062a144c41

Essential PIM 4.22 Outdated Libraries

Change Mirror Download
Hi @ll,

the current version of Essential PIM 4.22, available at
<http://www.astonsoft.com/epim_download/EssentialPIMPort4.zip>
with HTTP timestamp "Wed, 15 Jun 2011 13:20:12 GMT", comes with
VULNERABLE and COMPLETELY outdated 3rd party runtime libraries!


1. libeay32.dll and ssleay32.dll of OpenSSL 0.9.8i, from 2008-09-15

updated 8 times due to fixed vulnerabilities, current release is
0.9.8r; see <http://openssl.org/news/> and
<http://openssl.org/news/vulnerabilities.html>


2. msvcrt80.dll version 8.0.50727.42, from 2005-09-23

updated at least twice due to fixed vulnerabilities; see
<http://support.microsoft.com/kb/973544>,
<http://support.microsoft.com/kb/969706> and
<http://www.microsoft.com/technet/security/bulletin/MS09-035.mspx>
plus
<http://support.microsoft.com/kb/2467175>,
<http://support.microsoft.com/kb/2500212> and
<http://www.microsoft.com/technet/security/bulletin/MS11-025.mspx>.

For general guidelines see <http://support.microsoft.com/kb/326922>


3. gds32.dll of FirebirdSQL 2.1.2.18118, from 2009-02-28

updated at least once due to fixed vulnerabilities, current
release is 2.1.4; see <http://firebirdsql.org/>


4. icudt30.dll and icuuc30.dll 3.0.0.0, from 2009-02-27

updated quite some times and superseded with version 4 due to
fixed vulnerabilities:
CVE-2007-4770 CVE-2007-4771 CVE-2008-1036 CVE-2009-0153

current release is 4.8; see <http://site.icu-project.org/>


5. hunspelldll.dll <unknown version>, from 2009-06-26

current release is 1.3.1; see <http://hunspell.sourceforge.net/>


It needs REAL chuzpe to build and distribute software with those
vulnerable and outdated libraries (and most probably a vulnerable
and outdated development environment too).


Timeline:

2011-05-28 vulnerability report sent to vendor after release of v4.21

2011-05-30 vendor reply:
"We'll update them in the next version. Thanks for notice."

2011-06-15 vendor releases v4.22 with EXACT the same vulnerable libraries
already included in v4.21
vendor obviously doesn't care about security at all!

2011-06-17 vulnerability report published


Stefan Kanthak

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close