{"vuid":"VU#3062","idnumber":"3062","name":"Cenroll ActiveX Control allows creation of arbitrary files.","keywords":["security","activex","authenticode","javascript","xenroll","cenroll","PKCS#10","certificate","vbscript"],"overview":"The ActiveX control Cenroll permits unauthorized users to create files on the local system.","clean_desc":"The ActiveX control \"Cenroll\" (clsid: 43F8F289-7A20-11D0-8F06-00C04FC295E1), which is ordinarily marked safe-for-scripting allows callers to create files and write to the registry with the permissions of the process running the control. The Cenroll control is contained in the xenroll.dll library. Using the call Enroll.createFilePKCS10 an attacker can create a file with an arbitrary name containing the base-64-encoded contents of a PCKS#10 request which can then be submitted to a Certificate Authority for processing. Nothing restricts the name or size of the file that can be created.","impact":"An attacker can create files with arbitrary names. The contents of the file can be influenced by the intruder, but it is unclear if the influence can be leveraged in any useful way.","resolution":"The latest versions of Windows address this problem by limiting the number of times the control can be called before issuing a \"denial-of-service\" error message. (See Q242366) . This prevents attackers from using the control simply to create large numbers of files. To the best of our knowledge, there does not exist a general purpose fix to the problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Richard Smith of Phar Lap Software who reported this problem to us.","author":"This document was written by Shawn V Hernan.","public":["Microsoft Knowledgebase Article Q242366 (http://support.microsoft.com/support/kb/articles/Q242/3/66.ASP)","http://msdn.microsoft.com/library/psdk/certsrv/xen_ref_1j74.htm","http://rfc.roxen.com/rfc/rfc2314.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"1999-07-29T22:23:37Z","publicdate":"1999-07-29T00:00:00Z","datefirstpublished":"2000-12-14T18:59:16Z","dateupdated":"2001-08-10T15:27:41Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"4","cam_attackeraccessrequired":"20","cam_scorecurrent":"3.15","cam_scorecurrentwidelyknown":"3.15","cam_scorecurrentwidelyknownexploited":"5.4","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.15,"vulnote":null}